Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-3646 (GCVE-0-2018-3646)
Vulnerability from cvelistv5
Published
2018-08-14 19:00
Modified
2024-09-17 02:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Information Disclosure
Summary
Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Intel Corporation | Multiple |
Version: Multiple |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:50:30.406Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#982149", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/982149" }, { "name": "1041451", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041451" }, { "name": "GLSA-201810-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201810-06" }, { "name": "USN-3741-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3741-2/" }, { "name": "RHSA-2018:2393", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2393" }, { "name": "USN-3823-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3823-1/" }, { "name": "RHSA-2018:2389", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2389" }, { "name": "1042004", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1042004" }, { "name": "RHSA-2018:2390", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "name": "RHSA-2018:2403", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2403" }, { "name": "105080", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105080" }, { "name": "RHSA-2018:2395", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "name": "RHSA-2018:2384", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "name": "USN-3740-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3740-2/" }, { "name": "FreeBSD-SA-18:09", "tags": [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.asc" }, { "name": "DSA-4274", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4274" }, { "name": "FEDORA-2018-1c80fea1cd", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XRFKQWYV2H4BV75CUNGCGE5TNVQCLBGZ/" }, { "name": "RHSA-2018:2388", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2388" }, { "name": "USN-3741-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3741-1/" }, { "name": "RHSA-2018:2603", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2603" }, { "name": "RHSA-2018:2402", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2402" }, { "name": "20180814 CPU Side-Channel Information Disclosure Vulnerabilities: August 2018", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel" }, { "name": "FEDORA-2018-f8cba144ae", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V4UWGORQWCENCIF2BHWUEF2ODBV75QS2/" }, { "name": "USN-3742-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3742-2/" }, { "name": "RHSA-2018:2404", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2404" }, { "name": "USN-3740-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3740-1/" }, { "name": "RHSA-2018:2391", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2391" }, { "name": "RHSA-2018:2396", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2396" }, { "name": "DSA-4279", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4279" }, { "name": "RHSA-2018:2392", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2392" }, { "name": "[debian-lts-announce] 20180828 [SECURITY] [DLA 1481-1] linux-4.9 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html" }, { "name": "USN-3742-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3742-1/" }, { "name": "RHSA-2018:2602", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2602" }, { "name": "[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "name": "RHSA-2018:2394", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2394" }, { "name": "RHSA-2018:2387", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2387" }, { "name": "USN-3756-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3756-1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://xenbits.xen.org/xsa/advisory-273.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://foreshadowattack.eu/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180815-0001/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.lenovo.com/us/en/solutions/LEN-24163" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/support/security/Synology_SA_18_45" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03874en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0010" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2018-0020.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K31300402" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Multiple", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Multiple" } ] } ], "datePublic": "2018-08-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-15T02:22:59", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "VU#982149", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/982149" }, { "name": "1041451", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041451" }, { "name": "GLSA-201810-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201810-06" }, { "name": "USN-3741-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3741-2/" }, { "name": "RHSA-2018:2393", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2393" }, { "name": "USN-3823-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3823-1/" }, { "name": "RHSA-2018:2389", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2389" }, { "name": "1042004", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1042004" }, { "name": "RHSA-2018:2390", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "name": "RHSA-2018:2403", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2403" }, { "name": "105080", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105080" }, { "name": "RHSA-2018:2395", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "name": "RHSA-2018:2384", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "name": "USN-3740-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3740-2/" }, { "name": "FreeBSD-SA-18:09", "tags": [ "vendor-advisory", "x_refsource_FREEBSD" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.asc" }, { "name": "DSA-4274", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4274" }, { "name": "FEDORA-2018-1c80fea1cd", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XRFKQWYV2H4BV75CUNGCGE5TNVQCLBGZ/" }, { "name": "RHSA-2018:2388", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2388" }, { "name": "USN-3741-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3741-1/" }, { "name": "RHSA-2018:2603", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2603" }, { "name": "RHSA-2018:2402", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2402" }, { "name": "20180814 CPU Side-Channel Information Disclosure Vulnerabilities: August 2018", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel" }, { "name": "FEDORA-2018-f8cba144ae", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V4UWGORQWCENCIF2BHWUEF2ODBV75QS2/" }, { "name": "USN-3742-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3742-2/" }, { "name": "RHSA-2018:2404", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2404" }, { "name": "USN-3740-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3740-1/" }, { "name": "RHSA-2018:2391", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2391" }, { "name": "RHSA-2018:2396", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2396" }, { "name": "DSA-4279", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4279" }, { "name": "RHSA-2018:2392", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2392" }, { "name": "[debian-lts-announce] 20180828 [SECURITY] [DLA 1481-1] linux-4.9 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html" }, { "name": "USN-3742-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3742-1/" }, { "name": "RHSA-2018:2602", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2602" }, { "name": "[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "name": "RHSA-2018:2394", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2394" }, { "name": "RHSA-2018:2387", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2387" }, { "name": "USN-3756-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3756-1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://xenbits.xen.org/xsa/advisory-273.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://foreshadowattack.eu/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180815-0001/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.lenovo.com/us/en/solutions/LEN-24163" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/support/security/Synology_SA_18_45" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03874en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0010" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2018-0020.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K31300402" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2018-08-14T00:00:00", "ID": "CVE-2018-3646", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Multiple", "version": { "version_data": [ { "version_value": "Multiple" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "VU#982149", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/982149" }, { "name": "1041451", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041451" }, { "name": "GLSA-201810-06", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201810-06" }, { "name": "USN-3741-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3741-2/" }, { "name": "RHSA-2018:2393", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2393" }, { "name": "USN-3823-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3823-1/" }, { "name": "RHSA-2018:2389", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2389" }, { "name": "1042004", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1042004" }, { "name": "RHSA-2018:2390", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "name": "RHSA-2018:2403", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2403" }, { "name": "105080", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105080" }, { "name": "RHSA-2018:2395", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "name": "RHSA-2018:2384", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "name": "USN-3740-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3740-2/" }, { "name": "FreeBSD-SA-18:09", "refsource": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.asc" }, { "name": "DSA-4274", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4274" }, { "name": "FEDORA-2018-1c80fea1cd", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XRFKQWYV2H4BV75CUNGCGE5TNVQCLBGZ/" }, { "name": "RHSA-2018:2388", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2388" }, { "name": "USN-3741-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3741-1/" }, { "name": "RHSA-2018:2603", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2603" }, { "name": "RHSA-2018:2402", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2402" }, { "name": "20180814 CPU Side-Channel Information Disclosure Vulnerabilities: August 2018", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel" }, { "name": "FEDORA-2018-f8cba144ae", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V4UWGORQWCENCIF2BHWUEF2ODBV75QS2/" }, { "name": "USN-3742-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3742-2/" }, { "name": "RHSA-2018:2404", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2404" }, { "name": "USN-3740-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3740-1/" }, { "name": "RHSA-2018:2391", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2391" }, { "name": "RHSA-2018:2396", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2396" }, { "name": "DSA-4279", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4279" }, { "name": "RHSA-2018:2392", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2392" }, { "name": "[debian-lts-announce] 20180828 [SECURITY] [DLA 1481-1] linux-4.9 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html" }, { "name": "USN-3742-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3742-1/" }, { "name": "RHSA-2018:2602", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2602" }, { "name": "[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "name": "RHSA-2018:2394", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2394" }, { "name": "RHSA-2018:2387", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2387" }, { "name": "USN-3756-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3756-1/" }, { "name": "https://www.oracle.com/security-alerts/cpujul2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html", "refsource": "CONFIRM", "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", "refsource": "CONFIRM", "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "name": "http://xenbits.xen.org/xsa/advisory-273.html", "refsource": "CONFIRM", "url": "http://xenbits.xen.org/xsa/advisory-273.html" }, { "name": "https://foreshadowattack.eu/", "refsource": "MISC", "url": "https://foreshadowattack.eu/" }, { "name": "https://security.netapp.com/advisory/ntap-20180815-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180815-0001/" }, { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018", "refsource": "CONFIRM", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018" }, { "name": "http://support.lenovo.com/us/en/solutions/LEN-24163", "refsource": "CONFIRM", "url": "http://support.lenovo.com/us/en/solutions/LEN-24163" }, { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html" }, { "name": "https://www.synology.com/support/security/Synology_SA_18_45", "refsource": "CONFIRM", "url": "https://www.synology.com/support/security/Synology_SA_18_45" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03874en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03874en_us" }, { "name": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "refsource": "CONFIRM", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0010", "refsource": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0010" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2018-0020.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2018-0020.html" }, { "name": "https://support.f5.com/csp/article/K31300402", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K31300402" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-3646", "datePublished": "2018-08-14T19:00:00Z", "dateReserved": "2017-12-28T00:00:00", "dateUpdated": "2024-09-17T02:27:21.556Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-3646\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2018-08-14T19:29:00.920\",\"lastModified\":\"2024-11-21T04:05:50.020\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.\"},{\"lang\":\"es\",\"value\":\"Los sistemas con microprocesadores que emplean la ejecuci\u00f3n especulativa y traducciones de direcciones podr\u00eda permitir la divulgaci\u00f3n no autorizada de informaci\u00f3n que reside en la cach\u00e9 de datos L1 a un atacante con acceso de usuario local con privilegios de invitado del sistema operativo mediante un error de p\u00e1gina del terminal y un an\u00e1lisis de canal lateral.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N\",\"baseScore\":5.6,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.1,\"impactScore\":4.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:C/I:N/A:N\",\"baseScore\":4.7,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.4,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4229DB2-8BBC-49F8-87A8-2E7D56EFD310\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEBA7322-4D95-4E70-B6A5-E0D8F1B5D7EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0E91F46-D950-4894-BACF-05A70C7C6F7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E12B40B-5221-48A6-B2A6-D44CD5636BB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BCB77C9-ABE3-44A0-B377-7D7035E8A11F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D06639F5-5EE8-44F4-B48A-5694383154DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD9662C9-59D3-4B3E-A4DA-4F1EE16FC94B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"637C3687-FBCC-41A0-BFE6-823BAE45FB92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2350A197-193F-4B22-80E8-3275C97C78EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"734C7A7E-ACCA-4B34-BF38-0FAED988CC6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D9ABAFC-B3B5-449D-A48E-2E978563EDE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99019EA0-6576-4CE7-B60A-975D418AA917\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E846AEF-751D-40AD-84B5-EFDC9CF23E2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB9DD909-B2AC-46BA-B057-D239D0773CAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54F5C355-FDFC-4E71-93AA-218389EF10E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0A1CA1E-971D-4F67-864E-2E772C1E736B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B5F8391-D974-49AC-8550-ADB3FA6C0535\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8302BF58-9E54-40DA-BCFE-59CA52C460D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECCDE9EF-037B-4650-8131-4D57BE141277\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47BA9DA8-F690-4E3C-AEF6-6A5C7BAA6F19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB8253DA-9A04-40D6-84C1-C682B4023D4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAF6D175-85C3-4C72-AD9F-31B47EF43154\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A5FC594-2092-4240-9538-235BBE236DD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87D95F00-EA89-4FDE-991C-56636B8E0331\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32C40D38-F7F2-4A48-ADAA-6A8BBD6A1A00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4158561F-8270-42D1-91D8-E063CE7F5505\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF0DEA96-0202-41EB-BDC3-24E2FC4415B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8BACE1C-5D66-4FBC-8F86-30215A623A94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF707146-0D64-4F3A-AE22-956EA1CB32B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8118C3F9-0853-4E87-9E65-86E1398B2780\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A298501-C4D7-48D4-90F9-15AFA59DED48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEE1B07B-3D92-4D2D-8667-D902F002277F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F05CB19-1059-4C4D-BFD7-9F51A22A4F97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5588732F-7F1A-4C24-B35F-30532107FFDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A127DD5D-426D-4F24-A8C5-DC9DAC94B91C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26EE0BBD-3982-4B0F-82F6-D58E077C75DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAEEC918-EA25-4B38-B5C3-85899D3EBE6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"813965F4-3BDA-4478-8E6A-0FD52723B764\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C5EA2F4-F3EF-4305-B1A1-92F636ED688F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04384319-EE8C-45B4-8BDD-414502E7C02D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C52528CE-4F31-4E5F-8255-E576B20F3043\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6C3F422-F865-4160-AA24-1DAFAE63729C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D034E7F-4D17-49D7-BDB2-90CB4C709B30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C18E6B4-E947-403B-80FB-7095420D482B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2814CC9F-E027-4C5A-93AF-84EA445E6C12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24A470C3-AAAA-4A6E-B738-FEB69DB78B9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1236944-4942-40E4-9BA1-029FEAE94BBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"086CAB4B-A10A-4165-BC33-33CADCD23C0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1A6A1EB-B3AB-4CB4-827E-CCAAD783F8E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAFB6B30-BFB0-4397-9E16-37D1A772E639\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFCB9D7B-7D0A-435D-8499-C16BE09E19FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64277594-9713-436B-8056-542CFA9F4CFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"589BB170-7CBA-4F28-99E3-9242B62E2918\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91B9C4D9-DA09-4377-9DCD-225857BD9FA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03D0265F-840B-45A1-90BD-9ED8846A9F63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74BAC0EC-2B38-4553-A399-4BD5483C4753\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4477EBA6-F0A7-452B-96E8-BA788370CCA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1285D817-B5B8-4940-925D-FCDD24810AE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D289F7B4-27CD-4433-BB45-06AF98A59B7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00168903-6012-4414-87D1-2EE52AA6D78E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AE8D524-577E-4994-8A4B-D15022C84D7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75977B0B-C44D-43BC-8D7A-AF966CDB1901\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE7F5D52-9F41-49A4-B941-E0D777203FF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52B5B3FD-5BEA-4DE8-B010-55FED1547167\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"167B1B04-5823-4038-A019-3975A3B447C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6C7A4EA-0B5E-47CD-8924-3B1B60EB4BE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BA096E0-5480-47CB-822B-D11D7E20F69F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30357469-0B8F-4385-A282-2F50181EA442\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BE70772-7796-4594-880A-6AAD046E4D8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A9E2F8D-2974-4833-9EC2-233CEE257C26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17EE3078-454F-48F8-B201-3847DB40D5C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE32C500-55C2-41A7-8621-14EBF793BF11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52D3DF52-501A-4656-98F1-8DD51D04F31F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EA603AD-6CF1-44B2-876D-6F1C0B7EF2C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09578301-CF39-4C24-951A-535743E277EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F4D14AA-7DBF-4B73-BDEF-6248EF5C0F7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A65F303-96C8-4884-8D6F-F439B86BA30C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E046105-9DF5-425F-A97E-16081D54613C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2987BCF-39E6-49B6-8DEE-963A38F12B07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AEDE2B7-9AA2-4A14-8A02-9A2BFF0DDCBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AD92AD8-033A-4AAD-91E5-CB446CCE9732\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77E0E73A-F1B4-4E70-B9F1-EE97785B8891\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61D6E3CC-79B1-4995-9A76-41683C7F254A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9CEB2B1-BD1A-4B89-8E03-4F90F04A0F0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FE5773D-3CD1-4E63-8983-E0105C46D185\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A7C307A-6576-4A0A-8F4E-0981C9EE2901\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18B3A53B-902C-46A5-8CE7-B55102703278\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB843479-729A-4E58-8027-0FC586F051AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AF5A233-1E77-49FD-AC2C-60D185481E28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18519CF2-B0DA-42DD-8A3E-9084298C210A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"329D5FCF-7EC5-4471-906B-3619A180BD52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DD43EAA-F3A5-4748-9187-A6E6707ACD11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6F3C14D-4BFC-4205-8781-95E6B28C83C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20942AD8-ADB7-4A50-BDBE-DB36249F4F52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EC6ED02-134B-4322-AB72-75A0AB22701E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FA74EEE-54CC-4F80-B1D3-99F7771335ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6B859F7-0373-4ADD-92B3-0FAB42FCF23C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAC76F31-00A5-4719-AA50-92F773919B3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49996F5A-51B2-4D4E-AE04-E98E093A76CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F8406B0-D1E5-4633-B17E-53DC99FE7622\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D49435C-7C33-454B-9F43-9C10F28A28A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D17E1A0F-1150-4899-81BC-BE84E4EF5FA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EADD98AE-BAB0-440D-AB9F-2D76BE5109E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED44A404-8548-4EDC-8928-4094D05A6A38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A6E4AA3-BEBC-4B14-9A52-A8F8B2954D64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2AAD8F0-0D31-4806-8A88-A30E5BE43630\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8164EE5F-6ABA-4365-8718-2F98C2E57A0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7110AF9-A407-4EE2-9C46-E5F1E3638E9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A06696D-37F0-427D-BFC5-1606E7441C31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9F8A5FC-5EFE-42EC-A49B-D3A312FB5F6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68A76015-0A05-4EC7-B136-DC13B55D881F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C352DCE8-E8D9-40D3-AFE9-B5FB84F7ED33\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54464F6C-9B2D-46BA-AC44-506389F3EE0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FA11017-EA58-45EE-8408-FCCCF7183643\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A5098A5-E4E8-47E4-8CD0-F607FF0C0C90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"442AD778-D56F-4C30-BBF8-749D6AAC4737\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF7D3F31-AF4D-4C50-8590-A763AAC7AF07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"445BFC2E-38FA-4130-8550-0866EC4EDA33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6DC2746-CE41-40C9-8CFA-23231BBCAE77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C3A8976-5E4D-490A-A87D-A47D1B2B903C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C8535E6-220E-4747-8992-45B6EAFC555C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7479B49-F484-4DF2-86CB-E52EE89FA238\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6D68512-746D-4E95-857B-13A0B6313C5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4312BA84-F9A0-4BD4-8438-058E1E7D6C0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60E52DF5-C713-4BC4-B587-FF6BDA8509CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"304ADCAC-9E49-42BD-BC92-58D9B2AD52E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AB02172-B9A7-4801-88F2-98BF5843184A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5141380E-BD18-47C1-A84C-384BA821773D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AE6C49E-2359-4E44-9979-7D34F8460E35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C004B75F-37AF-4E61-98F3-1B09A7062DDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7126D19-C6D9-43CB-8809-647B1A20E7DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CC98503-A80A-4114-8BF2-E016659BE84E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01E6F4A7-24BE-4AA0-9CDD-84FBC56FE9BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3821412D-B010-49C4-A7B4-6C5FB6C603B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A34CA5CC-9EB1-4063-8B9D-3F566C1EFF76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CEB5D2D-FF54-4BDB-9E9C-8C1B2719FC9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AD5B51A-AEA0-4DA2-BA60-94A2D5605352\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F96C6CA0-434D-428F-B629-A971C2937628\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"301AB72A-A6F2-42C8-A931-94EF2271443F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59414B5A-05B8-49AF-A197-2A31729DDB65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BFDD380-692F-41D7-996F-F97FC74DC7CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49602828-2BFC-4571-9F05-6210FD263DF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87E03978-E16D-4A9B-8AE7-9F4F1171C14A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03096A9A-5758-47E6-81E2-BCFE847C41F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"150CC865-7975-45EC-BFF7-A94146442BA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8FA1308-589B-432B-80F9-9A499D083ED5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ED2453E-30E1-4620-BEC5-21B0083449E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FE8DD05-D700-4F89-9B01-D489029DF7A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"050957CA-6191-4F9F-9D07-48B342B3B1B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DACBF998-8B11-45C7-9017-486AED4FAE6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9F2F3C4-FC94-414A-A208-913A43D57D75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"641152EC-F4B4-4E5E-B396-AC4CAAB805BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4911E332-B8BA-4336-A448-3F70D2BBB147\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"330EC403-3174-4543-9BBE-CEC0ABC1575D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EF585D0-507E-491E-9C3B-78EE26F2F070\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD00F7C6-6762-4DC9-9F6C-5EAC4ACB1C54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F5D885A-85C4-4A11-B061-61EFF6B6E329\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0502B59F-933C-4E25-A2EC-9296B197E139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99D9C0A9-2DFF-4760-8FED-AC2DA7968E51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5A1BAEC-18BF-4607-BFB7-48102E75186A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D49ED138-F42D-4451-A350-0B2DD5AB9444\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ED91472-90FC-4AC8-96D5-1550A8502411\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57CEEFA6-CEED-4CA3-8DDC-B6601D69FB7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FD25ECD-0605-4CD7-9DC5-294ACD7EF1B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2784E2AF-A5E5-4960-830C-B3EFB84043D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9112FA50-5527-4B20-80F5-2DE9E66D09F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73CE4E2E-B2BF-409E-B18C-D67DA810FE9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2B84D67-0B1D-4B74-BC85-AF8F933D8429\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCA05A18-1523-4EED-9D2E-0A258A33F24F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C34E70EB-92F0-43F6-8883-FE422BE1A3FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78D301F1-20C2-4756-9A90-37F14835CE14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2EEC8B5-1CAB-4FBE-BBA2-D2FFA3EF9489\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA63B803-4D48-42E8-A793-F92ABCB8BFC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"129DB9CB-E878-4856-A954-15FFE1428636\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"730DB4AA-FD7D-40C6-8D7F-19937832EF9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07E86978-4820-422A-8C7C-FF0697DAED05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A7A9DB5-F544-4FD8-A9CC-0BD6257516AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF813AD9-D296-4915-861C-8DE929E45FE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04A65469-083F-40B5-86C5-A2EAE5B2F00A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F1AA82E-BD86-40F5-B417-71DF6AF53A37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B71A6DB0-5EB0-4712-8480-CF427F521D33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8223D5A1-ADF1-43C6-AF91-EE5C413BCB37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DD69605-F52B-4623-921A-983A5A408ECA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1D5685F-6FFE-4A6A-9FF8-940C8DA36499\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B94062D9-8DDA-4B4A-B3B5-07F71F5B97E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3832D0A6-419D-4876-B5C4-920578F713F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1AA5C8A-83A8-4F96-9D7C-7A50ADDB2341\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"404E38E6-9EB3-41D0-97A7-DC579688BFB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40E4A921-AB28-47B7-B5A3-EB82193D15BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0357E48-2300-47B4-B9E5-9FE813A2FC09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96CC28B6-57D1-4919-AA55-A262CC16AFE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EB4C54D-1265-425A-B507-E1099844875A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97362147-3A71-430D-9064-4435D45C3B8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89212CF3-4E99-4389-94CE-F4211DDCA01B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBEA4DA3-0AFB-4FCE-92DB-5B316775BB17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"611C0A0A-1FA3-42F9-82E8-BFCB71A077DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36F027D9-DCB4-4A3D-8987-41F2941DBD45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E23BCEC9-2BFB-4B41-9A7A-18B1347C6202\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4924CE39-A846-4DB4-9547-6322FC5AD6B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C9E2C9A-94A1-456B-90D5-54932DF64C22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC04C652-B2D8-4002-A50E-8AFE83204A25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10D413F0-CDBC-4A63-B9A7-9E7725BA1E83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"754A8826-59F7-4A71-B74B-737BE9C7DE4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FADB6BDA-6825-489B-AB39-7729BA45DFD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7913F57E-E600-4767-AF51-D045E1898E72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD3783F4-5A05-45AA-9791-A681011FD78C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01E3114D-31D2-4DBF-A664-F4049D8B6266\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8EE6578-981D-470C-BB24-4960B3CB1478\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3320D50-C5C9-4D75-BF1A-5BB7BCBFE2BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EE59839-8EB9-47FE-88E2-F0D54BE787A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75694A3D-080A-4AA7-97DF-5A5833C9D9F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19C5E27D-BBAB-4395-8FC6-8E3D4FB9A1EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E996176-3DEA-46E6-93B7-9C0DF32B59D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4417007D-126A-478B-87EA-039D088A4515\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F78C2825-F6A3-4188-9D25-59EAEC8A7B0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF2FA85D-B117-410D-B247-8C5A3479319A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A041D27-132C-4B15-976F-1750C039A89F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D495E06-BF2B-4C5A-881D-94C93CD2BA2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C31DFB8-8D8C-47D6-AAFF-BAE829A3D965\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"088BC395-06D5-4156-85EB-63C4A9552898\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33A220A2-A6D2-46A7-B168-607400EEDCE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E79232F-7196-440B-82D4-165885251232\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED866954-77AB-4CA8-8AED-4252C595FC4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28A1F516-B180-45D4-8EB1-754B7497CB2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36758A04-64D3-4150-A004-CF042FA31CD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E01752E-F1DD-400A-A917-216CAF15B0F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD47EC58-F776-4F59-8F15-4B208904CF4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D3781F4-2123-4FA1-8AF5-D0D1E6C1A5B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94565E35-8A58-4CB6-A489-C796DCB97FC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49964D35-5323-4412-BD54-661630F9A8CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0A37E7D-1BF6-4A2A-BF52-5F0EC4B4F341\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0F66468-87D0-41FC-934B-5924BE2956CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E0F93E1-4607-4DF4-AC6E-4B7254D4A8DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45C0D99E-443E-4AB1-A07A-900A09FE177E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6D0FD76-C1FB-43D0-8511-FC0BA6DA7960\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9DAEE52-09C3-4A09-9958-9D6807B2700B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B97690D4-E814-4D40-B170-BE56D7AE2C1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89804F2C-D32D-4444-ABEA-5B241153D096\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AAAAF9C-B29B-4020-BAFF-C87B1A08294A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECE60E1E-AB8D-46E4-A779-A54F2D20B5D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB958A28-7C9A-4BD0-B002-4E1A65CDB0A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C27B318-2AC1-423D-B0C8-583BB1800D5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E58E3D0-1154-4B13-BA16-67CE67DF0637\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32D2ACB3-B906-4944-A021-03C4645965BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FFF834A-D7F0-4E48-AD3D-DD0BCE6DEC0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E1A41BA-A1D6-484A-BAD2-68DF85598354\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11260C9D-69A9-4D81-9CCF-2E116DD75F7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C020F06-FD27-46E3-A48F-3F60F33BB969\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03C74F10-6A7F-4F68-8A34-E981E1760DE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24741B98-8D0E-4307-AAEF-A14B2531DCA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D4FA4BA-4304-4A70-9F86-120F2A3D8148\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"367FC8BA-F046-4264-A049-49E933E7698F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE9B68D3-1DFB-4468-85C4-AC13E6CBC111\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C966A016-B650-44D9-B8C4-1ED50AB318DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC448FF0-6D3F-4609-864B-4191905EE2B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FC246FE-4CA6-4B2D-83C3-D50A386C24A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"758A14DB-1BAF-442A-BA7C-5E9C67847BEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61309100-CFA7-4607-A236-8910838AA057\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82D76265-7BD0-4C51-AE77-22B22524DE81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE38B195-BB8D-4747-881D-E8033760B4C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AA8BE76-168D-48A3-8DF6-E91F44600408\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B656975-5D71-4712-9820-BDB7BC248AFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA045267-114D-4587-B6D7-E273C28DC9B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77018415-E122-406E-896D-1BC6CF790BE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ADF37F1-546B-4EF0-8DEC-DC3B9F5309FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7469256-1A64-46FF-8F5A-A8E9E3CF5BE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F9069B9-9FE3-4AD5-9A8E-55C0F73BD756\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4E1C012-3E05-44DB-B6D2-BFD619C034B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15D689D6-8594-42F2-8EEF-DCAEBA885A67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6446000-0494-4DC5-ABAA-F20A44546068\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99B94EEC-6690-45D0-B086-F4A5B25C25CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B767B6E-B3E6-4424-97A6-89A7E7EB0EEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"832AB3CD-E3A1-4CCB-A210-287973563D0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A26C0CC-68AD-40F5-96B8-87E6C643F6F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99C4221A-9994-43B3-9C7A-E13815A50A10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20070B1D-B91C-40BA-A9D8-E80170A2933F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A70129C9-371F-4542-A388-C095869E593A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C4DE25F-168A-4C67-8B66-09F61F072BD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58157F24-D89E-4552-8CE6-2F01E98BD1E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC7FFD78-1E1C-4246-BBD3-73FAC06AA46B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45ACBBEA-EC95-4F3E-B585-893DB6D21A0F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DEC55DF-1950-45E5-A5F2-B5604AFA1CBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6A5EC79-1B21-4BB3-8791-73507BC8D4DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCB4AFC3-FE30-4F46-ADC1-D03EB14E757D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0387587-AAB6-4284-8516-4DA3E3582D30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A238C975-9196-449F-9C15-ABB2E9FD1D06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F17F4A5-120B-4E00-97C8-8A85841ACBC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2537F047-64C9-4E73-B82C-310253184183\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A55857C-649D-46CE-AEDA-6E553E554FC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BA4892D-AFDF-4441-821E-5EBF7F64C9F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"327E06A3-7F0E-4498-8811-10C8D15398FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1624E6D6-858E-4085-B0B9-362B819EFD88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50D61F4A-40F0-477C-8326-7359D3626E77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1455B4DE-7F1C-4CF2-AE02-2EDD20025D62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B215788-860B-46CD-9A08-43AFF98FAEAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B92FAD5-CA6E-48F7-9613-3A4CE90F5F54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4EB132B-000C-4A17-AFB3-19F40A73D2CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C4815AE-B635-4545-83C2-5EC4E0128337\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0046C06-E3E6-4674-A4D1-332DD29D9552\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C191851-3DC3-41C7-AD89-81F091CCC83A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21126922-8E81-47F4-82D4-CBCDDACEC4FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"209E18B0-BBB5-4C65-B336-44340F7740DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C867C0B8-91A4-482A-B7DD-54AB9599AE52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30F03843-8A51-4CE1-BE6C-994BDE3A8F97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09854948-2657-4261-A32A-0523058F072E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D13904A5-266D-481C-A42A-734C3823A238\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACC82FCB-0541-45C4-8B7E-CB612D7F702A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C18BD84-5E9C-4C9E-B0AA-2CEB0D7A58C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F5ABC7E-C4E0-4850-A1E6-07EBCF4A87D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"501E9355-0CDD-4951-BCC3-47962788BCCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3D976D9-62F0-43C3-8359-E51E26B6CD87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02AFBCD0-9B4B-4CA3-8FA9-D8B6ECB24894\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64ADE9AF-196F-4E0B-BC66-7DE0183F9032\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C90CCA48-1705-4564-AAF9-271201BD5113\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B82BAFF-17F5-465C-8032-67D5ECAB2921\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F694FEC-B97D-4BDA-ADFA-751E8BFB7CD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F831371E-7437-48D7-8281-1F406215041B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC4F06B5-615A-464A-A0C4-7AABEE8530CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92AF503A-A2B1-4FC3-858B-264049ADF0F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E702C7EC-B1D9-4BDF-B334-2004CD76B52B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E39F31D6-DC4B-46FE-BE5D-EA612D915A96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51CB8036-5F36-4CD4-9B3E-D2401F2E64F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9849BA3-3990-4E30-B99B-ADD043314CDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A20FB18A-D3DA-4DE9-BEFF-75B7AB9B9A55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A67CD6F-5E4F-4E69-A2A9-A4033DCE08EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0A22E92-1EA7-45D9-AC86-EC3D9664C294\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7FA2911-6561-47BF-BEE8-DDA31642C346\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FA6CA23-6F2B-44D5-B2DA-4F142BA3E48A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F829DED-4D92-401A-BD80-C070DE57FC7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F560575C-FD8E-485D-B50A-572604BBE903\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ED8C51B-AE59-46DC-85F9-6D3B2891CB3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A38D00A-B9DC-44DF-8247-70355FF9A6EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"381EFC43-D5D9-4D10-90BE-4C333A9BA074\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBEDED18-2755-4C55-A1A1-04B4D5F40276\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F04B57EC-0731-40C8-939F-1C686A65A0FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AB301FB-EB3E-4F5F-868D-5B66CC7E1E6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE1D28F9-B135-441B-A9BF-792DD356E374\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D01CE3E-5C89-4FC0-9097-CAC483ACD441\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BDD55C4-AFCD-4DF2-921C-DDC1D7556DA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F52334F-BE6A-4FD4-9F63-AE9BB017115B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7C9BCC3-B9A6-4195-BF2F-E7BBCE8DC269\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A4DFFA7-AA0E-4D7E-97B8-13389FD47D4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"707F6671-57AC-4DF4-8024-444502E5C92E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C1FCE07-F9E8-4B14-95CE-01784D472128\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C208711F-FC06-46C8-8849-27054DC1B264\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25AB8041-F201-4BB3-AAD9-199B06697DF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D75C474C-D5EF-42D6-9B2A-A504BEFCB982\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F566CD3-3649-492B-B0AB-A107E51675B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB9F3D74-AE72-4FC5-83E9-890781AF3093\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E8EA6A7-4AB8-487E-B5DD-9989CC5F1CD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF63DDC8-A0C1-482B-92F2-CF6135E8C2A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C69918C6-7AAD-4AA5-AB72-C275367B1008\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06155B0B-A5AD-4A82-8C02-D264981687A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F76C19A4-FA26-432A-9443-9F92B2A946EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99BEE9BE-E49A-489B-B333-95D0993F8FA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7427A678-EC47-4030-B905-619DD95F5A82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86749716-1C9F-4C2A-B2A7-E62DEC10EA30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD000B53-06DA-4ED4-B0EE-9CB201B75C8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8424463-C329-4BAA-8AA1-25CD8B63292E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52727E62-0048-4C56-BC8C-B3450D257B21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D8223AA-F077-45FD-A7E3-3C2C1A8F6E91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAA34B50-2330-4D77-BF1A-6F05F3EF222C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6421F69-1076-43D2-B273-DE80FB2D5F72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1EDA9E2-CFE7-4917-BE48-A83208BDF0F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A34E7FC-93A4-45F2-A7B6-4A8ABFCAB0F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E611EDD-D44C-4311-B681-431D7C574528\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5E1B6AA-2F9A-43A8-9147-2BD9474E54C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1886D007-85B6-4E5A-968D-A1FD476A08A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDDDCB65-4404-49BC-9515-ECECD58A667F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B8D3E00-64C3-407A-9B00-8B6E383F73FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB1B00A1-9C15-47C2-9F57-66586DEACC7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB5BF932-459F-4DD2-B160-5FE0371C7D83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A58ACE96-F1BE-4261-8F94-FC3C6E7C7561\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"783D6EA7-C016-4314-A87B-4FED1DC7114B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AD0176F-FFAE-4A85-9327-CE72FE059E90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A56970C7-F8D3-41B2-A78B-0C7F4A2A4E0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26D4CE1F-86C8-4E48-9146-9DB57BF540FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB7F9D65-5537-4C25-B02B-2393F60D1299\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F09C8A92-820D-4572-A797-180E17A7DEB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA7D77A2-0D9A-4D0D-B0DC-152757917BE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A07D3F1A-16CE-461F-A2F4-80FE5F841CB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C04557A-C508-4FAD-A535-1C0AEFF08075\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AFAE489-6679-4705-BF9C-BB6D385A1DC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"429A99C8-BC55-4887-893C-7124C1A5DB08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3A2B709-CC19-4116-A5BE-5DB5C8B45A12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D79DAC74-1F28-4EC8-B417-3FAFFB74C4BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F1F1377-6220-43FB-BEF9-BAA7B0158147\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18422CA8-3000-46B1-9065-2369E6B0BE16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D558C66-E80E-4FC7-A0DF-485466390C46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E23EA9AE-9E70-47B5-AD9B-0DF13A0939E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"860F22F6-4C87-47C5-965E-02A1AFF41A72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19A2CA86-BFA8-4C78-987D-AD26F32622F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEF64E0A-CDB0-427E-A96F-095EFEBA0A3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"425F6D34-EE60-464B-8EA6-8116EDAA1219\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEB9F657-1239-4424-A2E8-F8BD98C0095E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F631403C-0A67-42CB-815C-133EB87E0C95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A4A5A57-B1A2-4BBA-AC36-7EA7DF9CDE06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0453C0EA-BA67-49D5-964F-35493F97D905\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D4D237E-ACB7-4382-AF5B-D27E634BF867\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5461EB2-2958-4923-86AF-C74D449120B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45C22141-E698-4E38-AF50-9CE04C1168FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49D0E470-427D-4A68-AFD2-982A4F7CE2D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43AB50F3-14AC-44BD-B7F0-A683C5FD1A3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"713C4B7A-C38A-4818-A258-D07DEDEC906E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C59740BE-FC30-4400-B978-1DB41282971C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"839728F0-5F23-462F-B493-C37EE4C874F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F1B47DA-BA53-4D7A-9B5B-582238D5E99A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D452F1BF-1FA5-463C-8F13-6357509FB5D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF6D1F4C-B396-468C-BA32-9367A68C95DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76A812F-D77A-49C8-B7A5-0C08258D4BBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E001AAB-07EC-47BF-BDE9-BB927872781D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1DF11F5-61E8-4A98-86C8-49D6B3224FCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AED153E7-99A2-4C02-B81B-C3DDF8FAE1A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D024802A-EA60-4D9B-B04C-027A0703EABD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA731F3C-1F04-4EE2-83EC-9486F5032903\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"544A59F6-E731-43C8-8455-69256933E71D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"624258EE-7FFF-4432-9B6D-4D60AA73CD9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69A2701A-35A8-4268-B9CF-40BA3219373B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15E671F6-8DED-4735-BE97-58A60E5B5C13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FC68B2A-8570-4311-BB60-49DBBDAF7430\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9826FA02-937E-4323-B9D5-8AE059ADBE95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B8630BB-48AA-4688-A6F0-212C1BB4D14C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AC98D35-D7D5-4C24-B47E-EDE2A80B2B9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2F8ABCB-12C3-4C45-844E-B07F77DA2DE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"326105AC-3926-437E-8AFF-916960107050\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"866E1275-7541-4B80-8FDF-53246A204C15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E190929D-D3CC-46E1-A903-0848829061DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81E4EBCB-B660-4F6A-AD73-81B9D8964162\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55D58CC5-CB46-464D-93B8-6AD5A19AF097\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16541D3E-EBBD-4D92-96D8-F169733377AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F08D257-F570-4D39-A6E8-0F60E55472E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C20ED667-2BFB-41C7-82BA-9F0C0044DA08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6158ED8A-007E-48B7-99BF-8BA03BF584BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBA7096A-F321-49A0-911A-F9683ABE6E6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A471395-7F8F-4BA5-962D-4D8F271FAB47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9484380-92B9-44DB-8E20-DC8DE02D1CA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8010808D-805D-4CA3-9EA2-55EB1E57964C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9716FE9F-A056-42A3-A241-F2FE37A6386A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F73422A3-ECA0-4C41-9AA5-CF7D77885CF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A96A5AF-C9EF-4DED-AE25-4540A2B02915\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5115B12-053A-4866-A833-D6EC88D8F93E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5619D4D-9685-4595-8A5F-A18273FE4213\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B77E00E7-0EA4-4E32-A693-0E0F66BA4C57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAA3457E-7E1A-4878-9752-79382E954A66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68630C63-4457-4E12-B7BD-AD456B237FC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6FB5695-2950-4CEC-81B4-FD280F835330\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F340AF8-508F-449D-9AFA-4E55F069B4F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E944410E-D674-4141-B50C-9F55090325FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6438E07-0AC0-4BF9-B0F2-9072CA9639D6\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5079AA70-C864-4AE2-809C-52B50632F2B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D124BCB-D8C3-49F5-B05C-E09B3CEBEBCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A86291B-C986-4320-BCEF-9F5AD8B309D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1227659F-1393-4189-978B-CC3DC53BF407\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C2DB843-638F-41EF-B486-409318AA2DE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0004D8A-A186-4DA2-A7AB-18A6456438FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75B6BE9F-F113-4976-951D-53F2E183A95A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEB005F1-9719-4985-B9D9-2140C962ADD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A94D0C1B-F30F-4724-915E-192C53FAE58A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F247860-1D2C-415C-AFBD-26BD875AAF02\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9697EDCD-A742-4AC6-876E-1080AD684207\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E73924A-875B-44D0-8F7C-A822B0488126\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03751B92-EE07-4F16-A476-BD25561810BC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAF71B61-A595-476B-B949-1A0FBDB360A6\"}]}]}],\"references\":[{\"url\":\"http://support.lenovo.com/us/en/solutions/LEN-24163\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/105080\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1041451\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1042004\",\"source\":\"secure@intel.com\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2018-0020.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://xenbits.xen.org/xsa/advisory-273.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2384\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2387\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2388\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2389\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2390\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2391\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2392\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2393\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2394\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2395\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2396\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2402\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2403\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2404\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2602\",\"source\":\"secure@intel.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2603\",\"source\":\"secure@intel.com\"},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf\",\"source\":\"secure@intel.com\"},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf\",\"source\":\"secure@intel.com\"},{\"url\":\"https://foreshadowattack.eu/\",\"source\":\"secure@intel.com\",\"tags\":[\"Technical Description\",\"Third Party Advisory\"]},{\"url\":\"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0\",\"source\":\"secure@intel.com\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html\",\"source\":\"secure@intel.com\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html\",\"source\":\"secure@intel.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V4UWGORQWCENCIF2BHWUEF2ODBV75QS2/\",\"source\":\"secure@intel.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XRFKQWYV2H4BV75CUNGCGE5TNVQCLBGZ/\",\"source\":\"secure@intel.com\"},{\"url\":\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018\",\"source\":\"secure@intel.com\"},{\"url\":\"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0010\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.asc\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201810-06\",\"source\":\"secure@intel.com\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20180815-0001/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault\",\"source\":\"secure@intel.com\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K31300402\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03874en_us\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3740-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3740-2/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3741-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3741-2/\",\"source\":\"secure@intel.com\"},{\"url\":\"https://usn.ubuntu.com/3742-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3742-2/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3756-1/\",\"source\":\"secure@intel.com\"},{\"url\":\"https://usn.ubuntu.com/3823-1/\",\"source\":\"secure@intel.com\"},{\"url\":\"https://www.debian.org/security/2018/dsa-4274\",\"source\":\"secure@intel.com\"},{\"url\":\"https://www.debian.org/security/2018/dsa-4279\",\"source\":\"secure@intel.com\"},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/982149\",\"source\":\"secure@intel.com\"},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2020.html\",\"source\":\"secure@intel.com\"},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html\",\"source\":\"secure@intel.com\"},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html\",\"source\":\"secure@intel.com\"},{\"url\":\"https://www.synology.com/support/security/Synology_SA_18_45\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.lenovo.com/us/en/solutions/LEN-24163\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/105080\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1041451\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1042004\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2018-0020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://xenbits.xen.org/xsa/advisory-273.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2384\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2387\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2388\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2389\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2390\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2391\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2392\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2393\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2394\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2395\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2396\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2402\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2403\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2404\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2602\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2603\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://foreshadowattack.eu/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Technical Description\",\"Third Party Advisory\"]},{\"url\":\"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V4UWGORQWCENCIF2BHWUEF2ODBV75QS2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XRFKQWYV2H4BV75CUNGCGE5TNVQCLBGZ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0010\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201810-06\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20180815-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K31300402\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03874en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3740-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3740-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3741-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3741-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/3742-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3742-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3756-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/3823-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.debian.org/security/2018/dsa-4274\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.debian.org/security/2018/dsa-4279\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/982149\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.synology.com/support/security/Synology_SA_18_45\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
suse-su-2018:2331-2
Vulnerability from csaf_suse
Published
2018-10-18 12:49
Modified
2018-10-18 12:49
Summary
Security update to ucode-intel
Notes
Title of the patch
Security update to ucode-intel
Description of the patch
ucode-intel was updated to the 20180807 release.
For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a) and is
part of the mitigations for CVE-2018-3639 (Spectre v4) and CVE-2018-3646
(L1 Terminal fault).
(bsc#1104134 bsc#1087082 bsc#1087083 bsc#1089343)
Processor Identifier Version Products
Model Stepping F-MO-S/PI Old->New
---- new platforms ----------------------------------------
WSM-EP/WS U1 6-2c-2/03 0000001f Xeon E/L/X56xx, W36xx
NHM-EX D0 6-2e-6/04 0000000d Xeon E/L/X65xx/75xx
BXT C0 6-5c-2/01 00000014 Atom T5500/5700
APL E0 6-5c-a/03 0000000c Atom x5-E39xx
DVN B0 6-5f-1/01 00000024 Atom C3xxx
---- updated platforms ------------------------------------
NHM-EP/WS D0 6-1a-5/03 00000019->0000001d Xeon E/L/X/W55xx
NHM B1 6-1e-5/13 00000007->0000000a Core i7-8xx, i5-7xx; Xeon L3426, X24xx
WSM B1 6-25-2/12 0000000e->00000011 Core i7-6xx, i5-6xx/4xxM, i3-5xx/3xxM, Pentium G69xx, Celeon P45xx; Xeon L3406
WSM K0 6-25-5/92 00000004->00000007 Core i7-6xx, i5-6xx/5xx/4xx, i3-5xx/3xx, Pentium G69xx/P6xxx/U5xxx, Celeron P4xxx/U3xxx
SNB D2 6-2a-7/12 0000002d->0000002e Core Gen2; Xeon E3
WSM-EX A2 6-2f-2/05 00000037->0000003b Xeon E7
IVB E2 6-3a-9/12 0000001f->00000020 Core Gen3 Mobile
HSW-H/S/E3 Cx/Dx 6-3c-3/32 00000024->00000025 Core Gen4 Desktop; Xeon E3 v3
BDW-U/Y E/F 6-3d-4/c0 0000002a->0000002b Core Gen5 Mobile
HSW-ULT Cx/Dx 6-45-1/72 00000023->00000024 Core Gen4 Mobile and derived Pentium/Celeron
HSW-H Cx 6-46-1/32 00000019->0000001a Core Extreme i7-5xxxX
BDW-H/E3 E/G 6-47-1/22 0000001d->0000001e Core i5-5xxxR/C, i7-5xxxHQ/EQ; Xeon E3 v4
SKL-U/Y D0 6-4e-3/c0 000000c2->000000c6 Core Gen6 Mobile
BDX-DE V1 6-56-2/10 00000015->00000017 Xeon D-1520/40
BDX-DE V2/3 6-56-3/10 07000012->07000013 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
BDX-DE Y0 6-56-4/10 0f000011->0f000012 Xeon D-1557/59/67/71/77/81/87
APL D0 6-5c-9/03 0000002c->00000032 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
SKL-H/S/E3 R0 6-5e-3/36 000000c2->000000c6 Core Gen6; Xeon E3 v5
Patchnames
SUSE-SLE-SERVER-12-SP2-BCL-2018-1573
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update to ucode-intel", "title": "Title of the patch" }, { "category": "description", "text": "\nucode-intel was updated to the 20180807 release.\n\nFor the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a) and is\npart of the mitigations for CVE-2018-3639 (Spectre v4) and CVE-2018-3646\n(L1 Terminal fault).\n(bsc#1104134 bsc#1087082 bsc#1087083 bsc#1089343)\n\n Processor Identifier Version Products\n\n Model Stepping F-MO-S/PI Old-\u003eNew\n\n ---- new platforms ----------------------------------------\n WSM-EP/WS U1 6-2c-2/03 0000001f Xeon E/L/X56xx, W36xx\n NHM-EX D0 6-2e-6/04 0000000d Xeon E/L/X65xx/75xx\n BXT C0 6-5c-2/01 00000014 Atom T5500/5700\n APL E0 6-5c-a/03 0000000c Atom x5-E39xx\n DVN B0 6-5f-1/01 00000024 Atom C3xxx\n ---- updated platforms ------------------------------------\n NHM-EP/WS D0 6-1a-5/03 00000019-\u003e0000001d Xeon E/L/X/W55xx\n NHM B1 6-1e-5/13 00000007-\u003e0000000a Core i7-8xx, i5-7xx; Xeon L3426, X24xx\n WSM B1 6-25-2/12 0000000e-\u003e00000011 Core i7-6xx, i5-6xx/4xxM, i3-5xx/3xxM, Pentium G69xx, Celeon P45xx; Xeon L3406\n WSM K0 6-25-5/92 00000004-\u003e00000007 Core i7-6xx, i5-6xx/5xx/4xx, i3-5xx/3xx, Pentium G69xx/P6xxx/U5xxx, Celeron P4xxx/U3xxx\n SNB D2 6-2a-7/12 0000002d-\u003e0000002e Core Gen2; Xeon E3\n WSM-EX A2 6-2f-2/05 00000037-\u003e0000003b Xeon E7\n IVB E2 6-3a-9/12 0000001f-\u003e00000020 Core Gen3 Mobile\n HSW-H/S/E3 Cx/Dx 6-3c-3/32 00000024-\u003e00000025 Core Gen4 Desktop; Xeon E3 v3\n BDW-U/Y E/F 6-3d-4/c0 0000002a-\u003e0000002b Core Gen5 Mobile\n HSW-ULT Cx/Dx 6-45-1/72 00000023-\u003e00000024 Core Gen4 Mobile and derived Pentium/Celeron\n HSW-H Cx 6-46-1/32 00000019-\u003e0000001a Core Extreme i7-5xxxX\n BDW-H/E3 E/G 6-47-1/22 0000001d-\u003e0000001e Core i5-5xxxR/C, i7-5xxxHQ/EQ; Xeon E3 v4\n SKL-U/Y D0 6-4e-3/c0 000000c2-\u003e000000c6 Core Gen6 Mobile\n BDX-DE V1 6-56-2/10 00000015-\u003e00000017 Xeon D-1520/40\n BDX-DE V2/3 6-56-3/10 07000012-\u003e07000013 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19\n BDX-DE Y0 6-56-4/10 0f000011-\u003e0f000012 Xeon D-1557/59/67/71/77/81/87\n APL D0 6-5c-9/03 0000002c-\u003e00000032 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx\n SKL-H/S/E3 R0 6-5e-3/36 000000c2-\u003e000000c6 Core Gen6; Xeon E3 v5\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-SP2-BCL-2018-1573", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2331-2.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2331-2", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182331-2/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2331-2", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004716.html" }, { "category": "self", "summary": "SUSE Bug 1087082", "url": "https://bugzilla.suse.com/1087082" }, { "category": "self", "summary": "SUSE Bug 1087083", "url": "https://bugzilla.suse.com/1087083" }, { "category": "self", "summary": "SUSE Bug 1089343", "url": "https://bugzilla.suse.com/1089343" }, { "category": "self", "summary": "SUSE Bug 1104134", "url": "https://bugzilla.suse.com/1104134" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3639 page", "url": "https://www.suse.com/security/cve/CVE-2018-3639/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3640 page", "url": "https://www.suse.com/security/cve/CVE-2018-3640/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update to ucode-intel", "tracking": { "current_release_date": "2018-10-18T12:49:10Z", "generator": { "date": "2018-10-18T12:49:10Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2331-2", "initial_release_date": "2018-10-18T12:49:10Z", "revision_history": [ { "date": "2018-10-18T12:49:10Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ucode-intel-20180807-13.29.1.x86_64", "product": { "name": "ucode-intel-20180807-13.29.1.x86_64", "product_id": "ucode-intel-20180807-13.29.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20180807-13.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20180807-13.29.1.x86_64" }, "product_reference": "ucode-intel-20180807-13.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-3639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3639" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20180807-13.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3639", "url": "https://www.suse.com/security/cve/CVE-2018-3639" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1085235 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085235" }, { "category": "external", "summary": "SUSE Bug 1085308 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085308" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092631 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092631" }, { "category": "external", "summary": "SUSE Bug 1092885 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092885" }, { "category": "external", "summary": "SUSE Bug 1094912 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1094912" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100394 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1100394" }, { "category": "external", "summary": "SUSE Bug 1102640 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1102640" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1105412" }, { "category": "external", "summary": "SUSE Bug 1111963 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1111963" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172781" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172782" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172783" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20180807-13.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20180807-13.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:49:10Z", "details": "moderate" } ], "title": "CVE-2018-3639" }, { "cve": "CVE-2018-3640", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3640" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20180807-13.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3640", "url": "https://www.suse.com/security/cve/CVE-2018-3640" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087083 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1087083" }, { "category": "external", "summary": "SUSE Bug 1094912 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1094912" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100394 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1100394" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1175912 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1175912" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20180807-13.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20180807-13.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:49:10Z", "details": "moderate" } ], "title": "CVE-2018-3640" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20180807-13.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20180807-13.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20180807-13.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:49:10Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2416-1
Vulnerability from csaf_suse
Published
2018-08-17 14:28
Modified
2018-08-17 14:28
Summary
Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP2)
Description of the patch
This update for the Linux Kernel 4.4.103-92_53 fixes several issues.
The following security issues were fixed:
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn't properly validate the sigevent->sigev_notify field, which lead to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bsc#1103203).
before 4.14.8
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
Patchnames
SUSE-SLE-Live-Patching-12-SP3-2018-1672,SUSE-SLE-Live-Patching-12-SP3-2018-1673,SUSE-SLE-Live-Patching-12-SP3-2018-1674,SUSE-SLE-Live-Patching-12-SP3-2018-1675,SUSE-SLE-Live-Patching-12-SP3-2018-1676,SUSE-SLE-Live-Patching-12-SP3-2018-1677,SUSE-SLE-SAP-12-SP2-2018-1667,SUSE-SLE-SAP-12-SP2-2018-1668,SUSE-SLE-SERVER-12-SP2-2018-1667,SUSE-SLE-SERVER-12-SP2-2018-1668
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.103-92_53 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).\n- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn\u0027t properly validate the sigevent-\u003esigev_notify field, which lead to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bsc#1103203).\nbefore 4.14.8\n- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn\u0027t propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-1672,SUSE-SLE-Live-Patching-12-SP3-2018-1673,SUSE-SLE-Live-Patching-12-SP3-2018-1674,SUSE-SLE-Live-Patching-12-SP3-2018-1675,SUSE-SLE-Live-Patching-12-SP3-2018-1676,SUSE-SLE-Live-Patching-12-SP3-2018-1677,SUSE-SLE-SAP-12-SP2-2018-1667,SUSE-SLE-SAP-12-SP2-2018-1668,SUSE-SLE-SERVER-12-SP2-2018-1667,SUSE-SLE-SERVER-12-SP2-2018-1668", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2416-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2416-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182416-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2416-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004470.html" }, { "category": "self", "summary": "SUSE Bug 1097108", "url": "https://bugzilla.suse.com/1097108" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE Bug 1103203", "url": "https://bugzilla.suse.com/1103203" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18344 page", "url": "https://www.suse.com/security/cve/CVE-2017-18344/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-08-17T14:28:45Z", "generator": { "date": "2018-08-17T14:28:45Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2416-1", "initial_release_date": "2018-08-17T14:28:45Z", "revision_history": [ { "date": "2018-08-17T14:28:45Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_92-6_30-default-8-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_92-6_30-default-8-2.1.ppc64le", "product_id": "kgraft-patch-4_4_92-6_30-default-8-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_103-6_38-default-8-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_103-6_38-default-8-2.1.ppc64le", "product_id": "kgraft-patch-4_4_103-6_38-default-8-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_103-6_33-default-8-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_103-6_33-default-8-2.1.ppc64le", "product_id": "kgraft-patch-4_4_103-6_33-default-8-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_114-94_14-default-6-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_114-94_14-default-6-2.1.ppc64le", "product_id": "kgraft-patch-4_4_114-94_14-default-6-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_114-94_11-default-6-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_114-94_11-default-6-2.1.ppc64le", "product_id": "kgraft-patch-4_4_114-94_11-default-6-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_92-6_18-default-9-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_92-6_18-default-9-2.1.x86_64", "product_id": "kgraft-patch-4_4_92-6_18-default-9-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_92-6_30-default-8-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_92-6_30-default-8-2.1.x86_64", "product_id": "kgraft-patch-4_4_92-6_30-default-8-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_103-6_38-default-8-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_103-6_38-default-8-2.1.x86_64", "product_id": "kgraft-patch-4_4_103-6_38-default-8-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_103-6_33-default-8-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_103-6_33-default-8-2.1.x86_64", "product_id": "kgraft-patch-4_4_103-6_33-default-8-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_114-94_14-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_114-94_14-default-6-2.1.x86_64", "product_id": "kgraft-patch-4_4_114-94_14-default-6-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_114-94_11-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_114-94_11-default-6-2.1.x86_64", "product_id": "kgraft-patch-4_4_114-94_11-default-6-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_103-92_56-default-8-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_103-92_56-default-8-2.1.x86_64", "product_id": "kgraft-patch-4_4_103-92_56-default-8-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_103-92_53-default-8-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_103-92_53-default-8-2.1.x86_64", "product_id": "kgraft-patch-4_4_103-92_53-default-8-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_18-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_92-6_18-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_30-default-8-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-8-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_92-6_30-default-8-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_30-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_92-6_30-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_38-default-8-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-8-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_103-6_38-default-8-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_38-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-6_38-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_33-default-8-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-8-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_103-6_33-default-8-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_33-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-6_33-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_14-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-6-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_114-94_14-default-6-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_14-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-94_14-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_11-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-6-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_114-94_11-default-6-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_11-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-94_11-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_18-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_92-6_18-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_30-default-8-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-8-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_92-6_30-default-8-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_30-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_92-6_30-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_38-default-8-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-8-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_103-6_38-default-8-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_38-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-6_38-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_33-default-8-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-8-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_103-6_33-default-8-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_33-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-6_33-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_14-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-6-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_114-94_14-default-6-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_14-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-94_14-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_11-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-6-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_114-94_11-default-6-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_11-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-94_11-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_18-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_92-6_18-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_30-default-8-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-8-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_92-6_30-default-8-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_30-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_92-6_30-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_38-default-8-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-8-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_103-6_38-default-8-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_38-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-6_38-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_33-default-8-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-8-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_103-6_33-default-8-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_33-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-6_33-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_14-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-6-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_114-94_14-default-6-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_14-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-94_14-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_11-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-6-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_114-94_11-default-6-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_11-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-94_11-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_18-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_92-6_18-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_30-default-8-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-8-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_92-6_30-default-8-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_30-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_92-6_30-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_38-default-8-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-8-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_103-6_38-default-8-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_38-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-6_38-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_33-default-8-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-8-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_103-6_33-default-8-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_33-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-6_33-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_14-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-6-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_114-94_14-default-6-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_14-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-94_14-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_11-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-6-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_114-94_11-default-6-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_11-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-94_11-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_18-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_92-6_18-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_30-default-8-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-8-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_92-6_30-default-8-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_30-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_92-6_30-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_38-default-8-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-8-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_103-6_38-default-8-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_38-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-6_38-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_33-default-8-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-8-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_103-6_33-default-8-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_33-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-6_33-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_14-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-6-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_114-94_14-default-6-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_14-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-94_14-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_11-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-6-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_114-94_11-default-6-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_11-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-94_11-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_18-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_92-6_18-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_30-default-8-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-8-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_92-6_30-default-8-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_30-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_92-6_30-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_38-default-8-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-8-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_103-6_38-default-8-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_38-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-6_38-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_33-default-8-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-8-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_103-6_33-default-8-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_33-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-6_33-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_14-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-6-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_114-94_14-default-6-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_14-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-94_14-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_11-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-6-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_114-94_11-default-6-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_11-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-94_11-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_56-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_56-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_53-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_53-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_56-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_56-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_53-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_53-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_56-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_56-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_53-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_53-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_56-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_56-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_53-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_53-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-18344", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18344" } ], "notes": [ { "category": "general", "text": "The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-8-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-8-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-8-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-8-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-8-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18344", "url": "https://www.suse.com/security/cve/CVE-2017-18344" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102851 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1102851" }, { "category": "external", "summary": "SUSE Bug 1103203 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103203" }, { "category": "external", "summary": "SUSE Bug 1103580 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103580" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-8-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-8-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-8-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-8-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-8-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-8-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-8-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-8-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-8-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-8-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-17T14:28:45Z", "details": "moderate" } ], "title": "CVE-2017-18344" }, { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-8-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-8-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-8-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-8-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-8-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-8-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-8-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-8-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-8-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-8-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-8-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-8-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-8-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-8-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-8-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-17T14:28:45Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-8-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-8-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-8-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-8-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-8-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-8-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-8-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-8-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-8-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-8-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-8-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-8-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-8-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-8-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-8-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-17T14:28:45Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:4300-1
Vulnerability from csaf_suse
Published
2018-12-28 17:38
Modified
2018-12-28 17:38
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
Update to Xen 4.10.2 bug fix release (bsc#1027519).
Security vulnerabilities fixed:
- CVE-2018-19961, CVE-2018-19962: Fixed an issue related to insufficient TLB
flushing with AMD IOMMUs, which potentially allowed a guest to escalate its
privileges, may cause a Denial of Service (DoS) affecting the entire host, or
may be able to access data it is not supposed to access. (XSA-275)
(bsc#1115040)
- CVE-2018-19965: Fixed an issue related to the INVPCID instruction in case
non-canonical addresses are accessed, which may allow a guest to cause Xen to
crash, resulting in a Denial of Service (DoS) affecting the entire host.
(XSA-279) (bsc#1115045)
- CVE-2018-19966: Fixed an issue related to a previous fix for XSA-240, which
conflicted with shadow paging and allowed a guest to cause Xen to crash,
resulting in a Denial of Service (DoS). (XSA-280) (bsc#1115047)
- CVE-2018-18883: Fixed an issue related to inproper restriction of nested VT-x,
which allowed a guest to cause Xen to crash, resulting in a Denial of Service
(DoS). (XSA-278) (bsc#1114405)
- CVE-2018-15468: Fixed incorrect MSR_DEBUGCTL handling, which allowed guests to
enable Branch Trace Store and may cause a Denial of Service (DoS) of the
entire host. (XSA-269) (bsc#1103276)
- CVE-2018-15469: Fixed use of v2 grant tables on ARM, which were not properly
implemented and may cause a Denial of Service (DoS). (XSA-268) (bsc#1103275)
- CVE-2018-15470: Fixed an issue in the logic in oxenstored for handling writes,
which allowed a guest to write memory unbounded leading to system-wide Denial
of Service (DoS). (XSA-272) (bsc#1103279)
- CVE-2018-3646: Mitigations for VMM aspects of L1 Terminal Fault (XSA-273)
(bsc#1091107)
Other bugs fixed:
- Fixed an issue related to a domU hang on SLE12-SP3 HV (bsc#1108940)
- Fixed an issue with xpti=no-dom0 not working as expected (bsc#1105528)
- Fixed a kernel oops related to fs/dcache.c called by d_materialise_unique() (bsc#1094508)
Patchnames
SUSE-SLE-Module-Basesystem-15-2018-3063,SUSE-SLE-Module-Server-Applications-15-2018-3063
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\nUpdate to Xen 4.10.2 bug fix release (bsc#1027519).\n\nSecurity vulnerabilities fixed:\n\n- CVE-2018-19961, CVE-2018-19962: Fixed an issue related to insufficient TLB\n flushing with AMD IOMMUs, which potentially allowed a guest to escalate its\n privileges, may cause a Denial of Service (DoS) affecting the entire host, or\n may be able to access data it is not supposed to access. (XSA-275)\n (bsc#1115040)\n- CVE-2018-19965: Fixed an issue related to the INVPCID instruction in case\n non-canonical addresses are accessed, which may allow a guest to cause Xen to\n crash, resulting in a Denial of Service (DoS) affecting the entire host.\n (XSA-279) (bsc#1115045)\n- CVE-2018-19966: Fixed an issue related to a previous fix for XSA-240, which\n conflicted with shadow paging and allowed a guest to cause Xen to crash,\n resulting in a Denial of Service (DoS). (XSA-280) (bsc#1115047)\n- CVE-2018-18883: Fixed an issue related to inproper restriction of nested VT-x,\n which allowed a guest to cause Xen to crash, resulting in a Denial of Service\n (DoS). (XSA-278) (bsc#1114405)\n- CVE-2018-15468: Fixed incorrect MSR_DEBUGCTL handling, which allowed guests to\n enable Branch Trace Store and may cause a Denial of Service (DoS) of the\n entire host. (XSA-269) (bsc#1103276)\n- CVE-2018-15469: Fixed use of v2 grant tables on ARM, which were not properly\n implemented and may cause a Denial of Service (DoS). (XSA-268) (bsc#1103275)\n- CVE-2018-15470: Fixed an issue in the logic in oxenstored for handling writes,\n which allowed a guest to write memory unbounded leading to system-wide Denial\n of Service (DoS). (XSA-272) (bsc#1103279)\n- CVE-2018-3646: Mitigations for VMM aspects of L1 Terminal Fault (XSA-273)\n (bsc#1091107)\n\nOther bugs fixed:\n\n- Fixed an issue related to a domU hang on SLE12-SP3 HV (bsc#1108940)\n- Fixed an issue with xpti=no-dom0 not working as expected (bsc#1105528)\n- Fixed a kernel oops related to fs/dcache.c called by d_materialise_unique() (bsc#1094508)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Basesystem-15-2018-3063,SUSE-SLE-Module-Server-Applications-15-2018-3063", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_4300-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:4300-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20184300-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:4300-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-December/005008.html" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1078292", "url": "https://bugzilla.suse.com/1078292" }, { "category": "self", "summary": "SUSE Bug 1091107", "url": "https://bugzilla.suse.com/1091107" }, { "category": "self", "summary": "SUSE Bug 1094508", "url": "https://bugzilla.suse.com/1094508" }, { "category": "self", "summary": "SUSE Bug 1103275", "url": "https://bugzilla.suse.com/1103275" }, { "category": "self", "summary": "SUSE Bug 1103276", "url": "https://bugzilla.suse.com/1103276" }, { "category": "self", "summary": "SUSE Bug 1103279", "url": "https://bugzilla.suse.com/1103279" }, { "category": "self", "summary": "SUSE Bug 1105528", "url": "https://bugzilla.suse.com/1105528" }, { "category": "self", "summary": "SUSE Bug 1108940", "url": "https://bugzilla.suse.com/1108940" }, { "category": "self", "summary": "SUSE Bug 1114405", "url": "https://bugzilla.suse.com/1114405" }, { "category": "self", "summary": "SUSE Bug 1115040", "url": "https://bugzilla.suse.com/1115040" }, { "category": "self", "summary": "SUSE Bug 1115045", "url": "https://bugzilla.suse.com/1115045" }, { "category": "self", "summary": "SUSE Bug 1115047", "url": "https://bugzilla.suse.com/1115047" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15468 page", "url": "https://www.suse.com/security/cve/CVE-2018-15468/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15469 page", "url": "https://www.suse.com/security/cve/CVE-2018-15469/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15470 page", "url": "https://www.suse.com/security/cve/CVE-2018-15470/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18883 page", "url": "https://www.suse.com/security/cve/CVE-2018-18883/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19961 page", "url": "https://www.suse.com/security/cve/CVE-2018-19961/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19962 page", "url": "https://www.suse.com/security/cve/CVE-2018-19962/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19965 page", "url": "https://www.suse.com/security/cve/CVE-2018-19965/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19966 page", "url": "https://www.suse.com/security/cve/CVE-2018-19966/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2018-12-28T17:38:50Z", "generator": { "date": "2018-12-28T17:38:50Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:4300-1", "initial_release_date": "2018-12-28T17:38:50Z", "revision_history": [ { "date": "2018-12-28T17:38:50Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-libs-4.10.2_04-3.9.1.x86_64", "product": { "name": "xen-libs-4.10.2_04-3.9.1.x86_64", "product_id": "xen-libs-4.10.2_04-3.9.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.10.2_04-3.9.1.x86_64", "product": { "name": "xen-tools-domU-4.10.2_04-3.9.1.x86_64", "product_id": "xen-tools-domU-4.10.2_04-3.9.1.x86_64" } }, { "category": "product_version", "name": "xen-4.10.2_04-3.9.1.x86_64", "product": { "name": "xen-4.10.2_04-3.9.1.x86_64", "product_id": "xen-4.10.2_04-3.9.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.10.2_04-3.9.1.x86_64", "product": { "name": "xen-devel-4.10.2_04-3.9.1.x86_64", "product_id": "xen-devel-4.10.2_04-3.9.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.10.2_04-3.9.1.x86_64", "product": { "name": "xen-tools-4.10.2_04-3.9.1.x86_64", "product_id": "xen-tools-4.10.2_04-3.9.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Server Applications 15", "product": { "name": "SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-server-applications:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.10.2_04-3.9.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.2_04-3.9.1.x86_64" }, "product_reference": "xen-libs-4.10.2_04-3.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.10.2_04-3.9.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.2_04-3.9.1.x86_64" }, "product_reference": "xen-tools-domU-4.10.2_04-3.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.10.2_04-3.9.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.2_04-3.9.1.x86_64" }, "product_reference": "xen-4.10.2_04-3.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.10.2_04-3.9.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.2_04-3.9.1.x86_64" }, "product_reference": "xen-devel-4.10.2_04-3.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.10.2_04-3.9.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.2_04-3.9.1.x86_64" }, "product_reference": "xen-tools-4.10.2_04-3.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-15468", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15468" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) can lock up the entire host, causing a Denial of Service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.2_04-3.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15468", "url": "https://www.suse.com/security/cve/CVE-2018-15468" }, { "category": "external", "summary": "SUSE Bug 1103276 for CVE-2018-15468", "url": "https://bugzilla.suse.com/1103276" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.2_04-3.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.2_04-3.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-12-28T17:38:50Z", "details": "moderate" } ], "title": "CVE-2018-15468" }, { "cve": "CVE-2018-15469", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15469" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.11.x. ARM never properly implemented grant table v2, either in the hypervisor or in Linux. Unfortunately, an ARM guest can still request v2 grant tables; they will simply not be properly set up, resulting in subsequent grant-related hypercalls hitting BUG() checks. An unprivileged guest can cause a BUG() check in the hypervisor, resulting in a denial-of-service (crash).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.2_04-3.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15469", "url": "https://www.suse.com/security/cve/CVE-2018-15469" }, { "category": "external", "summary": "SUSE Bug 1103275 for CVE-2018-15469", "url": "https://bugzilla.suse.com/1103275" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.2_04-3.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.2_04-3.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-12-28T17:38:50Z", "details": "moderate" } ], "title": "CVE-2018-15469" }, { "cve": "CVE-2018-15470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15470" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.11.x. The logic in oxenstored for handling writes depended on the order of evaluation of expressions making up a tuple. As indicated in section 7.7.3 \"Operations on data structures\" of the OCaml manual, the order of evaluation of subexpressions is not specified. In practice, different implementations behave differently. Thus, oxenstored may not enforce the configured quota-maxentity. This allows a malicious or buggy guest to write as many xenstore entries as it wishes, causing unbounded memory usage in oxenstored. This can lead to a system-wide DoS.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.2_04-3.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15470", "url": "https://www.suse.com/security/cve/CVE-2018-15470" }, { "category": "external", "summary": "SUSE Bug 1103279 for CVE-2018-15470", "url": "https://bugzilla.suse.com/1103279" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.2_04-3.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.2_04-3.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-12-28T17:38:50Z", "details": "moderate" } ], "title": "CVE-2018-15470" }, { "cve": "CVE-2018-18883", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-18883" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen 4.9.x through 4.11.x, on Intel x86 platforms, allowing x86 HVM and PVH guests to cause a host OS denial of service (NULL pointer dereference) or possibly have unspecified other impact because nested VT-x is not properly restricted.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.2_04-3.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-18883", "url": "https://www.suse.com/security/cve/CVE-2018-18883" }, { "category": "external", "summary": "SUSE Bug 1114405 for CVE-2018-18883", "url": "https://bugzilla.suse.com/1114405" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.2_04-3.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.2_04-3.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-12-28T17:38:50Z", "details": "moderate" } ], "title": "CVE-2018-18883" }, { "cve": "CVE-2018-19961", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19961" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because TLB flushes do not always occur after IOMMU mapping changes.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.2_04-3.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19961", "url": "https://www.suse.com/security/cve/CVE-2018-19961" }, { "category": "external", "summary": "SUSE Bug 1115040 for CVE-2018-19961", "url": "https://bugzilla.suse.com/1115040" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-19961", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.2_04-3.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.2_04-3.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-12-28T17:38:50Z", "details": "important" } ], "title": "CVE-2018-19961" }, { "cve": "CVE-2018-19962", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19962" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because small IOMMU mappings are unsafely combined into larger ones.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.2_04-3.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19962", "url": "https://www.suse.com/security/cve/CVE-2018-19962" }, { "category": "external", "summary": "SUSE Bug 1115040 for CVE-2018-19962", "url": "https://bugzilla.suse.com/1115040" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-19962", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.2_04-3.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.2_04-3.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-12-28T17:38:50Z", "details": "important" } ], "title": "CVE-2018-19962" }, { "cve": "CVE-2018-19965", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19965" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-5754 (aka Meltdown) mitigation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.2_04-3.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19965", "url": "https://www.suse.com/security/cve/CVE-2018-19965" }, { "category": "external", "summary": "SUSE Bug 1115045 for CVE-2018-19965", "url": "https://bugzilla.suse.com/1115045" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.2_04-3.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.2_04-3.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-12-28T17:38:50Z", "details": "moderate" } ], "title": "CVE-2018-19965" }, { "cve": "CVE-2018-19966", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19966" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service (host OS crash) or possibly gain host OS privileges because of an interpretation conflict for a union data structure associated with shadow paging. NOTE: this issue exists because of an incorrect fix for CVE-2017-15595.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.2_04-3.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19966", "url": "https://www.suse.com/security/cve/CVE-2018-19966" }, { "category": "external", "summary": "SUSE Bug 1115047 for CVE-2018-19966", "url": "https://bugzilla.suse.com/1115047" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-19966", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.2_04-3.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.2_04-3.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-12-28T17:38:50Z", "details": "moderate" } ], "title": "CVE-2018-19966" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.2_04-3.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.2_04-3.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.2_04-3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.2_04-3.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-12-28T17:38:50Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2346-1
Vulnerability from csaf_suse
Published
2018-08-16 06:06
Modified
2018-08-16 06:06
Summary
Security update for the Linux Kernel (Live Patch 27 for SLE 12)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 27 for SLE 12)
Description of the patch
This update for the Linux Kernel 3.12.61-52_92 fixes several issues.
The following security issues were fixed:
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2017-11600: net/xfrm/xfrm_policy.c did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bsc#1096564)
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
Patchnames
SUSE-SLE-SERVER-12-2018-1589
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 27 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_92 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).\n- CVE-2017-11600: net/xfrm/xfrm_policy.c did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bsc#1096564) \n- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn\u0027t propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-1589", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2346-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2346-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182346-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2346-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004429.html" }, { "category": "self", "summary": "SUSE Bug 1096564", "url": "https://bugzilla.suse.com/1096564" }, { "category": "self", "summary": "SUSE Bug 1097108", "url": "https://bugzilla.suse.com/1097108" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE CVE CVE-2017-11600 page", "url": "https://www.suse.com/security/cve/CVE-2017-11600/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for the Linux Kernel (Live Patch 27 for SLE 12)", "tracking": { "current_release_date": "2018-08-16T06:06:01Z", "generator": { "date": "2018-08-16T06:06:01Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2346-1", "initial_release_date": "2018-08-16T06:06:01Z", "revision_history": [ { "date": "2018-08-16T06:06:01Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_92-default-10-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_92-default-10-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_92-default-10-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_92-xen-10-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_92-xen-10-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_92-xen-10-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_92-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_92-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_92-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_92-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-11600", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-11600" } ], "notes": [ { "category": "general", "text": "net/xfrm/xfrm_policy.c in the Linux kernel through 4.12.3, when CONFIG_XFRM_MIGRATE is enabled, does not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allows local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-11600", "url": "https://www.suse.com/security/cve/CVE-2017-11600" }, { "category": "external", "summary": "SUSE Bug 1050231 for CVE-2017-11600", "url": "https://bugzilla.suse.com/1050231" }, { "category": "external", "summary": "SUSE Bug 1096564 for CVE-2017-11600", "url": "https://bugzilla.suse.com/1096564" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-11600", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:06:01Z", "details": "important" } ], "title": "CVE-2017-11600" }, { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:06:01Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:06:01Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2355-1
Vulnerability from csaf_suse
Published
2018-08-16 06:07
Modified
2018-08-16 06:07
Summary
Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP1)
Description of the patch
This update for the Linux Kernel 3.12.74-60_64_57 fixes several issues.
The following security issues were fixed:
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2017-11600: net/xfrm/xfrm_policy.c did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bsc#1096564)
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
Patchnames
SUSE-SLE-SAP-12-SP1-2018-1601,SUSE-SLE-SERVER-12-SP1-2018-1601
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_57 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).\n- CVE-2017-11600: net/xfrm/xfrm_policy.c did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bsc#1096564) \n- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn\u0027t propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-1601,SUSE-SLE-SERVER-12-SP1-2018-1601", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2355-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2355-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182355-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2355-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004438.html" }, { "category": "self", "summary": "SUSE Bug 1096564", "url": "https://bugzilla.suse.com/1096564" }, { "category": "self", "summary": "SUSE Bug 1097108", "url": "https://bugzilla.suse.com/1097108" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE CVE CVE-2017-11600 page", "url": "https://www.suse.com/security/cve/CVE-2017-11600/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-08-16T06:07:04Z", "generator": { "date": "2018-08-16T06:07:04Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2355-1", "initial_release_date": "2018-08-16T06:07:04Z", "revision_history": [ { "date": "2018-08-16T06:07:04Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_57-default-11-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_57-default-11-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_57-default-11-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_57-xen-11-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_57-xen-11-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_57-xen-11-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_57-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_57-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_57-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_57-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_57-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_57-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_57-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_57-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-11600", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-11600" } ], "notes": [ { "category": "general", "text": "net/xfrm/xfrm_policy.c in the Linux kernel through 4.12.3, when CONFIG_XFRM_MIGRATE is enabled, does not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allows local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-xen-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-11600", "url": "https://www.suse.com/security/cve/CVE-2017-11600" }, { "category": "external", "summary": "SUSE Bug 1050231 for CVE-2017-11600", "url": "https://bugzilla.suse.com/1050231" }, { "category": "external", "summary": "SUSE Bug 1096564 for CVE-2017-11600", "url": "https://bugzilla.suse.com/1096564" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-11600", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-xen-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-xen-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:07:04Z", "details": "important" } ], "title": "CVE-2017-11600" }, { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-xen-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-xen-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-xen-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:07:04Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-xen-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-xen-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-xen-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:07:04Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2413-1
Vulnerability from csaf_suse
Published
2018-08-17 14:57
Modified
2018-08-17 14:57
Summary
Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP3)
Description of the patch
This update for the Linux Kernel 4.4.82-6_6 fixes several issues.
The following security issues were fixed:
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn't properly validate the sigevent->sigev_notify field, which lead to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bsc#1103203).
before 4.14.8
- CVE-2017-17053: The init_new_context function in arch/x86/include/asm/mmu_context.h did not correctly handle errors from LDT table allocation when forking a new process, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program. This vulnerability only affected kernels built with CONFIG_MODIFY_LDT_SYSCALL=y (bsc#1096679).
- CVE-2017-11600: net/xfrm/xfrm_policy.c did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bsc#1096564)
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
Patchnames
SUSE-SLE-Live-Patching-12-SP3-2018-1669,SUSE-SLE-Live-Patching-12-SP3-2018-1670,SUSE-SLE-Live-Patching-12-SP3-2018-1671
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.82-6_6 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).\n- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn\u0027t properly validate the sigevent-\u003esigev_notify field, which lead to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bsc#1103203).\nbefore 4.14.8\n- CVE-2017-17053: The init_new_context function in arch/x86/include/asm/mmu_context.h did not correctly handle errors from LDT table allocation when forking a new process, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program. This vulnerability only affected kernels built with CONFIG_MODIFY_LDT_SYSCALL=y (bsc#1096679).\n- CVE-2017-11600: net/xfrm/xfrm_policy.c did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bsc#1096564) \n- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn\u0027t propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-1669,SUSE-SLE-Live-Patching-12-SP3-2018-1670,SUSE-SLE-Live-Patching-12-SP3-2018-1671", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2413-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2413-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182413-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2413-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004468.html" }, { "category": "self", "summary": "SUSE Bug 1096564", "url": "https://bugzilla.suse.com/1096564" }, { "category": "self", "summary": "SUSE Bug 1096679", "url": "https://bugzilla.suse.com/1096679" }, { "category": "self", "summary": "SUSE Bug 1097108", "url": "https://bugzilla.suse.com/1097108" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE Bug 1103203", "url": "https://bugzilla.suse.com/1103203" }, { "category": "self", "summary": "SUSE CVE CVE-2017-11600 page", "url": "https://www.suse.com/security/cve/CVE-2017-11600/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17053 page", "url": "https://www.suse.com/security/cve/CVE-2017-17053/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18344 page", "url": "https://www.suse.com/security/cve/CVE-2017-18344/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-08-17T14:57:02Z", "generator": { "date": "2018-08-17T14:57:02Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2413-1", "initial_release_date": "2018-08-17T14:57:02Z", "revision_history": [ { "date": "2018-08-17T14:57:02Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_82-6_3-default-11-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_82-6_3-default-11-2.1.x86_64", "product_id": "kgraft-patch-4_4_82-6_3-default-11-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_82-6_9-default-10-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_82-6_9-default-10-2.1.x86_64", "product_id": "kgraft-patch-4_4_82-6_9-default-10-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_82-6_6-default-10-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_82-6_6-default-10-2.1.x86_64", "product_id": "kgraft-patch-4_4_82-6_6-default-10-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_82-6_3-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_82-6_3-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_82-6_9-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_82-6_9-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_82-6_6-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_82-6_6-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_82-6_3-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_82-6_3-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_82-6_9-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_82-6_9-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_82-6_6-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_82-6_6-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_82-6_3-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_82-6_3-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_82-6_9-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_82-6_9-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_82-6_6-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_82-6_6-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-11600", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-11600" } ], "notes": [ { "category": "general", "text": "net/xfrm/xfrm_policy.c in the Linux kernel through 4.12.3, when CONFIG_XFRM_MIGRATE is enabled, does not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allows local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-11600", "url": "https://www.suse.com/security/cve/CVE-2017-11600" }, { "category": "external", "summary": "SUSE Bug 1050231 for CVE-2017-11600", "url": "https://bugzilla.suse.com/1050231" }, { "category": "external", "summary": "SUSE Bug 1096564 for CVE-2017-11600", "url": "https://bugzilla.suse.com/1096564" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-11600", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-17T14:57:02Z", "details": "important" } ], "title": "CVE-2017-11600" }, { "cve": "CVE-2017-17053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17053" } ], "notes": [ { "category": "general", "text": "The init_new_context function in arch/x86/include/asm/mmu_context.h in the Linux kernel before 4.12.10 does not correctly handle errors from LDT table allocation when forking a new process, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program. This vulnerability only affected kernels built with CONFIG_MODIFY_LDT_SYSCALL=y.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17053", "url": "https://www.suse.com/security/cve/CVE-2017-17053" }, { "category": "external", "summary": "SUSE Bug 1070264 for CVE-2017-17053", "url": "https://bugzilla.suse.com/1070264" }, { "category": "external", "summary": "SUSE Bug 1096679 for CVE-2017-17053", "url": "https://bugzilla.suse.com/1096679" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-17T14:57:02Z", "details": "moderate" } ], "title": "CVE-2017-17053" }, { "cve": "CVE-2017-18344", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18344" } ], "notes": [ { "category": "general", "text": "The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18344", "url": "https://www.suse.com/security/cve/CVE-2017-18344" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102851 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1102851" }, { "category": "external", "summary": "SUSE Bug 1103203 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103203" }, { "category": "external", "summary": "SUSE Bug 1103580 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103580" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-17T14:57:02Z", "details": "moderate" } ], "title": "CVE-2017-18344" }, { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-17T14:57:02Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-11-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-10-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-17T14:57:02Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2596-1
Vulnerability from csaf_suse
Published
2018-09-03 15:29
Modified
2018-09-03 15:29
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP3 RT kernel was updated to 4.4.147 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn't properly validate the sigevent->sigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bnc#1102851 bsc#1103580).
- CVE-2018-10876: A flaw was found in the ext4 filesystem code. A use-after-free was possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image. (bnc#1099811)
- CVE-2018-10877: The ext4 filesystem was vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image. (bnc#1099846)
- CVE-2018-10878: A flaw was found in the ext4 filesystem. A local user could cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image. (bnc#1099813)
- CVE-2018-10879: A flaw was found in the ext4 filesystem. A local user could cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image. (bnc#1099844)
- CVE-2018-10880: Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service. (bnc#1099845)
- CVE-2018-10881: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099864)
- CVE-2018-10882: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image. (bnc#1099849)
- CVE-2018-10883: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099863)
- CVE-2018-14734: drivers/infiniband/core/ucma.c allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).
- CVE-2018-3620: Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis (bnc#1087081).
- CVE-2018-3646: Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis (bnc#1089343 bnc#1104365).
- CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bnc#1102340).
- CVE-2018-5391 aka 'FragmentSmack': A flaw in the IP packet reassembly could be used by remote attackers to consume lots of CPU time (bnc#1103097).
- CVE-2018-9363: A buffer overflow in bluetooth HID report processing could be used by malicious bluetooth devices to crash the kernel or potentially execute code (bnc#1105292).
The following non-security bugs were fixed:
- acpi / pci: Bail early in acpi_pci_add_bus() if there is no ACPI handle (bnc#1012382).
- Add support for 5,25,50, and 100G to 802.3ad bonding driver (bsc#1096978)
- ahci: Disable LPM on Lenovo 50 series laptops with a too old BIOS (bnc#1012382).
- alsa: emu10k1: add error handling for snd_ctl_add (bnc#1012382).
- alsa: emu10k1: Rate-limit error messages about page errors (bnc#1012382).
- alsa: fm801: add error handling for snd_ctl_add (bnc#1012382).
- alsa: hda/ca0132: fix build failure when a local macro is defined (bnc#1012382).
- alsa: rawmidi: Change resized buffers atomically (bnc#1012382).
- alsa: usb-audio: Apply rate limit to warning messages in URB complete callback (bnc#1012382).
- arc: Fix CONFIG_SWAP (bnc#1012382).
- arc: mm: allow mprotect to make stack mappings executable (bnc#1012382).
- arm64: do not open code page table entry creation (bsc#1102197).
- arm64: kpti: Use early_param for kpti= command-line option (bsc#1102188).
- arm64: Make sure permission updates happen for pmd/pud (bsc#1102197).
- arm: dts: imx6q: Use correct SDMA script for SPI5 core (bnc#1012382).
- arm: fix put_user() for gcc-8 (bnc#1012382).
- asoc: dpcm: fix BE dai not hw_free and shutdown (bnc#1012382).
- asoc: pxa: Fix module autoload for platform drivers (bnc#1012382).
- ath10k: fix rfc1042 header retrieval in QCA4019 with eth decap mode (bnc#1012382).
- ath: Add regulatory mapping for APL13_WORLD (bnc#1012382).
- ath: Add regulatory mapping for APL2_FCCA (bnc#1012382).
- ath: Add regulatory mapping for Bahamas (bnc#1012382).
- ath: Add regulatory mapping for Bermuda (bnc#1012382).
- ath: Add regulatory mapping for ETSI8_WORLD (bnc#1012382).
- ath: Add regulatory mapping for FCC3_ETSIC (bnc#1012382).
- ath: Add regulatory mapping for Serbia (bnc#1012382).
- ath: Add regulatory mapping for Tanzania (bnc#1012382).
- ath: Add regulatory mapping for Uganda (bnc#1012382).
- atm: zatm: Fix potential Spectre v1 (bnc#1012382).
- audit: allow not equal op for audit by executable (bnc#1012382).
- bcache: add backing_request_endio() for bi_end_io (bsc#1064232).
- bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1064232).
- bcache: add io_disable to struct cached_dev (bsc#1064232).
- bcache: add journal statistic (bsc#1076110).
- bcache: Add __printf annotation to __bch_check_keys() (bsc#1064232).
- bcache: add stop_when_cache_set_failed option to backing device (bsc#1064232).
- bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1064232).
- bcache: Annotate switch fall-through (bsc#1064232).
- bcache: closures: move control bits one bit right (bsc#1076110).
- bcache: correct flash only vols (check all uuids) (bsc#1064232).
- bcache: count backing device I/O error for writeback I/O (bsc#1064232).
- bcache: Fix a compiler warning in bcache_device_init() (bsc#1064232).
- bcache: fix cached_dev->count usage for bch_cache_set_error() (bsc#1064232).
- bcache: fix crashes in duplicate cache device register (bsc#1076110).
- bcache: fix error return value in memory shrink (bsc#1064232).
- bcache: fix high CPU occupancy during journal (bsc#1076110).
- bcache: Fix, improve efficiency of closure_sync() (bsc#1076110).
- bcache: fix inaccurate io state for detached bcache devices (bsc#1064232).
- bcache: fix incorrect sysfs output value of strip size (bsc#1064232).
- bcache: Fix indentation (bsc#1064232).
- bcache: Fix kernel-doc warnings (bsc#1064232).
- bcache: fix misleading error message in bch_count_io_errors() (bsc#1064232).
- bcache: fix using of loop variable in memory shrink (bsc#1064232).
- bcache: fix writeback target calc on large devices (bsc#1076110).
- bcache: fix wrong return value in bch_debug_init() (bsc#1076110).
- bcache: mark closure_sync() __sched (bsc#1076110).
- bcache: move closure debug file into debug directory (bsc#1064232).
- bcache: reduce cache_set devices iteration by devices_max_used (bsc#1064232).
- bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1064232).
- bcache: Remove an unused variable (bsc#1064232).
- bcache: ret IOERR when read meets metadata error (bsc#1076110).
- bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1064232).
- bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1064232).
- bcache: set dc->io_disable to true in conditional_stop_bcache_device() (bsc#1064232).
- bcache: set error_limit correctly (bsc#1064232).
- bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1064232).
- bcache: stop bcache device when backing device is offline (bsc#1064232).
- bcache: stop dc->writeback_rate_update properly (bsc#1064232).
- bcache: stop writeback thread after detaching (bsc#1076110).
- bcache: store disk name in struct cache and struct cached_dev (bsc#1064232).
- bcache: Suppress more warnings about set-but-not-used variables (bsc#1064232).
- bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1064232).
- bcache: Use PTR_ERR_OR_ZERO() (bsc#1076110).
- bcm63xx_enet: correct clock usage (bnc#1012382).
- bcm63xx_enet: do not write to random DMA channel on BCM6345 (bnc#1012382).
- blkcg: simplify statistic accumulation code (bsc#1082979).
- block: copy ioprio in __bio_clone_fast() (bsc#1082653).
- block: do not use interruptible wait anywhere (bnc#1012382).
- block/swim: Fix array bounds check (bsc#1082979).
- bluetooth: btusb: Add a new Realtek 8723DE ID 2ff8:b011 (bnc#1012382).
- bluetooth: hci_qca: Fix 'Sleep inside atomic section' warning (bnc#1012382).
- bpf: fix loading of BPF_MAXINSNS sized programs (bsc#1012382).
- bpf: fix references to free_bpf_prog_info() in comments (bnc#1012382).
- bpf, x64: fix memleak when not converging after image (bsc#1012382).
- brcmfmac: Add support for bcm43364 wireless chipset (bnc#1012382).
- btrfs: add barriers to btrfs_sync_log before log_commit_wait wakeups (bnc#1012382).
- btrfs: Do not remove block group still has pinned down bytes (bsc#1086457).
- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bnc#1012382).
- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf (git-fixes).
- cachefiles: Fix missing clear of the CACHEFILES_OBJECT_ACTIVE flag (bsc#1099858).
- cachefiles: Fix refcounting bug in backing-file read monitoring (bsc#1099858).
- cachefiles: Wait rather than BUG'ing on 'Unexpected object collision' (bsc#1099858).
- can: ems_usb: Fix memory leak on ems_usb_disconnect() (bnc#1012382).
- can: xilinx_can: fix device dropping off bus on RX overrun (bnc#1012382).
- can: xilinx_can: fix incorrect clear of non-processed interrupts (bnc#1012382).
- can: xilinx_can: fix recovery from error states not being propagated (bnc#1012382).
- can: xilinx_can: fix RX loop if RXNEMP is asserted without RXOK (bnc#1012382).
- can: xilinx_can: fix RX overflow interrupt not being enabled (bnc#1012382).
- can: xilinx_can: keep only 1-2 frames in TX FIFO to fix TX accounting (bnc#1012382).
- cifs: fix bad/NULL ptr dereferencing in SMB2_sess_setup() (bsc#1090123).
- cifs: Fix infinite loop when using hard mount option (bnc#1012382).
- clk: tegra: Fix PLL_U post divider and initial rate on Tegra30 (bnc#1012382).
- compiler, clang: always inline when CONFIG_OPTIMIZE_INLINING is disabled (bnc#1012382).
- compiler, clang: properly override 'inline' for clang (bnc#1012382).
- compiler, clang: suppress warning for unused static inline functions (bnc#1012382).
- compiler-gcc.h: Add __attribute__((gnu_inline)) to all inline declarations (bnc#1012382).
- cpu/hotplug: Add sysfs state interface (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- crypto: authenc - do not leak pointers to authenc keys (bnc#1012382).
- crypto: authencesn - do not leak pointers to authenc keys (bnc#1012382).
- crypto: crypto4xx - fix crypto4xx_build_pdr, crypto4xx_build_sdr leak (bnc#1012382).
- crypto: crypto4xx - remove bad list_del (bnc#1012382).
- crypto: padlock-aes - Fix Nano workaround data corruption (bnc#1012382).
- disable loading f2fs module on PAGE_SIZE > 4KB (bnc#1012382).
- dmaengine: pxa_dma: remove duplicate const qualifier (bnc#1012382).
- dma-iommu: Fix compilation when !CONFIG_IOMMU_DMA (bnc#1012382).
- dm thin metadata: remove needless work from __commit_transaction (bsc#1082979).
- documentation/spec_ctrl: Do some minor cleanups (bnc#1012382).
- drbd: fix access after free (bnc#1012382).
- driver core: Partially revert 'driver core: correct device's shutdown order' (bnc#1012382).
- drm: Add DP PSR2 sink enable bit (bnc#1012382).
- drm/atomic: Handling the case when setting old crtc for plane (bnc#1012382).
- drm/cirrus: Use drm_framebuffer_put to avoid kernel oops in clean-up (bsc#1101822).
- drm/gma500: fix psb_intel_lvds_mode_valid()'s return type (bnc#1012382).
- drm/msm: Fix possible null dereference on failure of get_pages() (bsc#1102394).
- drm/radeon: fix mode_valid's return type (bnc#1012382).
- drm: re-enable error handling (bsc#1103884).
- esp6: fix memleak on error path in esp6_input (git-fixes).
- ext4: add more inode number paranoia checks (bnc#1012382).
- ext4: add more mount time checks of the superblock (bnc#1012382).
- ext4: always check block group bounds in ext4_init_block_bitmap() (bnc#1012382).
- ext4: check for allocation block validity with block group locked (bsc#1104495).
- ext4: check superblock mapped prior to committing (bnc#1012382).
- ext4: clear i_data in ext4_inode_info when removing inline data (bnc#1012382).
- ext4: do not update s_last_mounted of a frozen fs (bsc#1101841).
- ext4: factor out helper ext4_sample_last_mounted() (bsc#1101841).
- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).
- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).
- ext4: fix inline data updates with checksums enabled (bsc#1104494).
- ext4: include the illegal physical block in the bad map ext4_error msg (bnc#1012382).
- ext4: make sure bitmaps and the inode table do not overlap with bg descriptors (bnc#1012382).
- ext4: only look at the bg_flags field if it is valid (bnc#1012382).
- ext4: verify the depth of extent tree in ext4_find_extent() (bnc#1012382).
- f2fs: fix to do not trigger writeback during recovery (bnc#1012382).
- fat: fix memory allocation failure handling of match_strdup() (bnc#1012382).
- fscache: Allow cancelled operations to be enqueued (bsc#1099858).
- fscache: Fix reference overput in fscache_attach_object() error handling (bsc#1099858).
- genirq: Make force irq threading setup more robust (bsc#1082979).
- hid: debug: check length before copy_to_user() (bnc#1012382).
- hid: hiddev: fix potential Spectre v1 (bnc#1012382).
- hid: hid-plantronics: Re-resend Update to map button for PTT products (bnc#1012382).
- hid: i2c-hid: check if device is there before really probing (bnc#1012382).
- hid: i2c-hid: Fix 'incomplete report' noise (bnc#1012382).
- hid: usbhid: add quirk for innomedia INNEX GENESIS/ATARI adapter (bnc#1012382).
- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bnc#1012382).
- i2c: imx: Fix reinit_completion() use (bnc#1012382).
- i2c: rcar: fix resume by always initializing registers before transfer (bnc#1012382).
- ib/isert: fix T10-pi check mask setting (bsc#1082979).
- ibmasm: do not write out of bounds in read handler (bnc#1012382).
- ibmvnic: Fix error recovery on login failure (bsc#1101789).
- ibmvnic: Remove code to request error information (bsc#1104174).
- ibmvnic: Revise RX/TX queue error messages (bsc#1101331).
- ibmvnic: Update firmware error reporting with cause string (bsc#1104174).
- inet: frag: enforce memory limits earlier (bnc#1012382 bsc#970506).
- input: elan_i2c - add ACPI ID for lenovo ideapad 330 (bnc#1012382).
- input: elan_i2c - add another ACPI ID for Lenovo Ideapad 330-15AST (bnc#1012382).
- input: i8042 - add Lenovo LaVie Z to the i8042 reset list (bnc#1012382).
- ipconfig: Correctly initialise ic_nameservers (bnc#1012382).
- ip: hash fragments consistently (bnc#1012382).
- ip: in cmsg IP(V6)_ORIGDSTADDR call pskb_may_pull (bnc#1012382).
- ipv4: Fix error return value in fib_convert_metrics() (bnc#1012382).
- ipv4: remove BUG_ON() from fib_compute_spec_dst (bnc#1012382).
- ipv4: Return EINVAL when ping_group_range sysctl does not map to user ns (bnc#1012382).
- ipv6: fix useless rol32 call on hash (bnc#1012382).
- iw_cxgb4: correctly enforce the max reg_mr depth (bnc#1012382).
- iwlwifi: pcie: fix race in Rx buffer allocator (bnc#1012382).
- jbd2: do not mark block as modified if the handle is out of credits (bnc#1012382).
- kabi protect includes in include/linux/inet.h (bsc#1095643).
- KABI protect net/core/utils.c includes (bsc#1095643).
- kABI: protect struct loop_device (kabi).
- kABI: reexport tcp_send_ack (kabi).
- kABI: reintroduce __static_cpu_has_safe (kabi).
- kabi/severities: add 'drivers/md/bcache/* PASS' since no one uses symboles expoted by bcache.
- kbuild: fix # escaping in .cmd files for future Make (bnc#1012382).
- KEYS: DNS: fix parsing multiple options (bnc#1012382).
- kmod: fix wait on recursive loop (bsc#1099792).
- kmod: reduce atomic operations on kmod_concurrent and simplify (bsc#1099792).
- kmod: throttle kmod thread limit (bsc#1099792).
- kprobes/x86: Do not modify singlestep buffer while resuming (bnc#1012382).
- kthread, tracing: Do not expose half-written comm when creating kthreads (bsc#1104897).
- kvm: arm/arm64: Drop resource size check for GICV window (bsc#1102215).
- kvm: arm/arm64: Set dist->spis to NULL after kfree (bsc#1102214).
- kvm/Eventfd: Avoid crash when assign and deassign specific eventfd in parallel (bnc#1012382).
- kvm: x86: vmx: fix vpid leak (bnc#1012382).
- libata: do not try to pass through NCQ commands to non-NCQ devices (bsc#1082979).
- libata: Fix command retry decision (bnc#1012382).
- lib/rhashtable: consider param->min_size when setting initial table size (bnc#1012382).
- loop: add recursion validation to LOOP_CHANGE_FD (bnc#1012382).
- loop: remember whether sysfs_create_group() was done (bnc#1012382).
- md: fix NULL dereference of mddev->pers in remove_and_add_spares() (bnc#1012382).
- media: cx25840: Use subdev host data for PLL override (bnc#1012382).
- media: omap3isp: fix unbalanced dma_iommu_mapping (bnc#1012382).
- media: rcar_jpu: Add missing clk_disable_unprepare() on error in jpu_open() (bnc#1012382).
- media: saa7164: Fix driver name in debug output (bnc#1012382).
- media: si470x: fix __be16 annotations (bnc#1012382).
- media: siano: get rid of __le32/__le16 cast warnings (bnc#1012382).
- media: videobuf2-core: do not call memop 'finish' when queueing (bnc#1012382).
- memory: tegra: Apply interrupts mask per SoC (bnc#1012382).
- memory: tegra: Do not handle spurious interrupts (bnc#1012382).
- mfd: cros_ec: Fail early if we cannot identify the EC (bnc#1012382).
- microblaze: Fix simpleImage format generation (bnc#1012382).
- mmc: dw_mmc: fix card threshold control configuration (bsc#1102203).
- mm: check VMA flags to avoid invalid PROT_NONE NUMA balancing (bsc#1097771).
- mm: hugetlb: yield when prepping struct pages (bnc#1012382).
- mm: memcg: fix use after free in mem_cgroup_iter() (bnc#1012382).
- mm/slub.c: add __printf verification to slab_err() (bnc#1012382).
- mm: vmalloc: avoid racy handling of debugobjects in vunmap (bnc#1012382).
- mtd: cfi_cmdset_0002: Change definition naming to retry write operation (bnc#1012382).
- mtd: cfi_cmdset_0002: Change erase functions to check chip good only (bnc#1012382).
- mtd: cfi_cmdset_0002: Change erase functions to retry for error (bnc#1012382).
- mtd: rawnand: fsl_ifc: fix FSL NAND driver to read all ONFI parameter pages (bnc#1012382).
- mtd: rawnand: mxc: set spare area size register explicitly (bnc#1012382).
- mtd: ubi: wl: Fix error return code in ubi_wl_init() (git-fixes).
- mwifiex: correct histogram data with appropriate index (bnc#1012382).
- mwifiex: handle race during mwifiex_usb_disconnect (bnc#1012382).
- net: cxgb3_main: fix potential Spectre v1 (bnc#1012382).
- net: dccp: avoid crash in ccid3_hc_rx_send_feedback() (bnc#1012382).
- net: dccp: switch rx_tstamp_last_feedback to monotonic clock (bnc#1012382).
- net: Do not copy pfmemalloc flag in __copy_skb_header() (bnc#1012382).
- net: dsa: Do not suspend/resume closed slave_dev (bnc#1012382).
- netfilter: ebtables: reject non-bridge targets (bnc#1012382).
- netfilter: ipset: List timing out entries with 'timeout 1' instead of zero (bnc#1012382).
- netfilter: ipvs: do not create conn for ABORT packet in sctp_conn_schedule (bsc#1102797).
- netfilter: ipvs: fix the issue that sctp_conn_schedule drops non-INIT packet (bsc#1102797).
- netfilter: nf_log: do not hold nf_log_mutex during user access (bnc#1012382).
- netfilter: nf_queue: augment nfqa_cfg_policy (bnc#1012382).
- netfilter: nf_tables: use WARN_ON_ONCE instead of BUG_ON in nft_do_chain() (bnc#1012382).
- netfilter: x_tables: initialise match/target check parameter struct (bnc#1012382).
- net: fix amd-xgbe flow-control issue (bnc#1012382).
- net/ipv4: Set oif in fib_compute_spec_dst (bnc#1012382).
- net: lan78xx: fix rx handling before first packet is send (bnc#1012382).
- netlink: Do not shift on 64 for ngroups (bnc#1012382).
- netlink: Do not shift with UB on nlk->ngroups (bnc#1012382).
- netlink: Do not subscribe to non-existent groups (bnc#1012382).
- netlink: Fix spectre v1 gadget in netlink_create() (bnc#1012382).
- net/mlx4_core: Save the qpn from the input modifier in RST2INIT wrapper (bnc#1012382).
- net/mlx5: Fix command interface race in polling mode (bnc#1012382).
- net/mlx5: Fix incorrect raw command length parsing (bnc#1012382).
- net: mvneta: fix the Rx desc DMA address in the Rx path (bsc#1102207).
- net/nfc: Avoid stalls when nfc_alloc_send_skb() returned NULL (bnc#1012382).
- net: off by one in inet6_pton() (bsc#1095643).
- net: phy: fix flag masking in __set_phy_supported (bnc#1012382).
- net: phy: marvell: Use strlcpy() for ethtool::get_strings (bsc#1102205).
- net_sched: blackhole: tell upper qdisc about dropped packets (bnc#1012382).
- net: socket: fix potential spectre v1 gadget in socketcall (bnc#1012382).
- net: stmmac: align DMA stuff to largest cache line length (bnc#1012382).
- net: sungem: fix rx checksum support (bnc#1012382).
- net/utils: generic inet_pton_with_scope helper (bsc#1095643).
- net: vmxnet3: use new api ethtool_{get|set}_link_ksettings (bsc#1091860 bsc#1098253).
- nfsd: fix potential use-after-free in nfsd4_decode_getdeviceinfo (bnc#1012382).
- nohz: Fix local_timer_softirq_pending() (bnc#1012382).
- n_tty: Access echo_* variables carefully (bnc#1012382).
- n_tty: Fix stall at n_tty_receive_char_special() (bnc#1012382).
- null_blk: use sector_div instead of do_div (bsc#1082979).
- nvme-pci: initialize queue memory before interrupts (bnc#1012382).
- nvme-rdma: Check remotely invalidated rkey matches our expected rkey (bsc#1092001).
- nvme-rdma: default MR page size to 4k (bsc#1092001).
- nvme-rdma: do not complete requests before a send work request has completed (bsc#1092001).
- nvme-rdma: do not suppress send completions (bsc#1092001).
- nvme-rdma: Fix command completion race at error recovery (bsc#1090435).
- nvme-rdma: make nvme_rdma_[create|destroy]_queue_ib symmetrical (bsc#1092001).
- nvme-rdma: use inet_pton_with_scope helper (bsc#1095643).
- nvme-rdma: Use mr pool (bsc#1092001).
- nvme-rdma: wait for local invalidation before completing a request (bsc#1092001).
- ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent (bnc#1012382).
- pci: ibmphp: Fix use-before-set in get_max_bus_speed() (bsc#1100132).
- pci: pciehp: Request control of native hotplug only if supported (bnc#1012382).
- pci: Prevent sysfs disable of device while driver is attached (bnc#1012382).
- perf: fix invalid bit in diagnostic entry (bnc#1012382).
- perf tools: Move syscall number fallbacks from perf-sys.h to tools/arch/x86/include/asm/ (bnc#1012382).
- perf/x86/intel/uncore: Correct fixed counter index check for NHM (bnc#1012382).
- perf/x86/intel/uncore: Correct fixed counter index check in generic code (bnc#1012382).
- pinctrl: at91-pio4: add missing of_node_put (bnc#1012382).
- pm / hibernate: Fix oops at snapshot_write() (bnc#1012382).
- powerpc/32: Add a missing include header (bnc#1012382).
- powerpc/64: Initialise thread_info for emergency stacks (bsc#1094244, bsc#1100930, bsc#1102683).
- powerpc/64s: Fix compiler store ordering to SLB shadow area (bnc#1012382).
- powerpc/8xx: fix invalid register expression in head_8xx.S (bnc#1012382).
- powerpc/chrp/time: Make some functions static, add missing header include (bnc#1012382).
- powerpc/embedded6xx/hlwd-pic: Prevent interrupts from being handled by Starlet (bnc#1012382).
- powerpc/fadump: handle crash memory ranges array index overflow (bsc#1103269).
- powerpc/fadump: merge adjacent memory ranges to reduce PT_LOAD segements (bsc#1103269).
- powerpc/powermac: Add missing prototype for note_bootable_part() (bnc#1012382).
- powerpc/powermac: Mark variable x as unused (bnc#1012382).
- provide special timeout module parameters for EC2 (bsc#1065364).
- ptp: fix missing break in switch (bnc#1012382).
- qed: Limit msix vectors in kdump kernel to the minimum required count (bnc#1012382).
- r8152: napi hangup fix after disconnect (bnc#1012382).
- random: mix rdrand with entropy sent in from userspace (bnc#1012382).
- rdma/mad: Convert BUG_ONs to error flows (bnc#1012382).
- rdma/ocrdma: Fix an error code in ocrdma_alloc_pd() (bsc#1082979).
- rdma/ocrdma: Fix error codes in ocrdma_create_srq() (bsc#1082979).
- rdma/ucm: Mark UCM interface as BROKEN (bnc#1012382).
- rds: avoid unenecessary cong_update in loop transport (bnc#1012382).
- regulator: pfuze100: add .is_enable() for pfuze100_swb_regulator_ops (bnc#1012382).
- Remove broken patches for dac9063 watchdog (bsc#1100843)
- restore cond_resched() in shrink_dcache_parent() (bsc#1098599).
- Revert 'block-cancel-workqueue-entries-on-blk_mq_freeze_queue' (bsc#1103717)
- Revert 'net: Do not copy pfmemalloc flag in __copy_skb_header()' (kabi).
- Revert 'sit: reload iphdr in ipip6_rcv' (bnc#1012382).
- Revert 'skbuff: Unconditionally copy pfmemalloc in __skb_clone()' (kabi).
- Revert 'x86/cpufeature: Move some of the scattered feature bits to x86_capability' (kabi).
- Revert 'x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6' (kabi).
- Revert 'x86/mm: Give each mm TLB flush generation a unique ID' (kabi).
- Revert 'x86/speculation: Use Indirect Branch Prediction Barrier in context switch' (kabi).
- ring_buffer: tracing: Inherit the tracing setting to next ring buffer (bnc#1012382).
- rsi: Fix 'invalid vdd' warning in mmc (bnc#1012382).
- rtc: ensure rtc_set_alarm fails when alarms are not supported (bnc#1012382).
- rtlwifi: rtl8821ae: fix firmware is not ready to run (bnc#1012382).
- rtnetlink: add rtnl_link_state check in rtnl_configure_link (bnc#1012382).
- s390: Correct register corruption in critical section cleanup (bnc#1012382).
- s390/cpum_sf: Add data entry sizes to sampling trailer entry (bnc#1012382).
- s390/qeth: fix error handling in adapter command callbacks (bnc#1103745, LTC#169699).
- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).
- sched/smt: Update sched_smt_present at runtime (bsc#1089343).
- scsi: 3w-9xxx: fix a missing-check bug (bnc#1012382).
- scsi: 3w-xxxx: fix a missing-check bug (bnc#1012382).
- scsi: megaraid_sas: Increase timeout by 1 sec for non-RAID fastpath IOs (bnc#1012382).
- scsi: megaraid: silence a static checker bug (bnc#1012382).
- scsi: qla2xxx: Fix ISP recovery on unload (bnc#1012382).
- scsi: qla2xxx: Return error when TMF returns (bnc#1012382).
- scsi: qlogicpti: Fix an error handling path in 'qpti_sbus_probe()' (bsc#1082979).
- scsi: scsi_dh: replace too broad 'TP9' string with the exact models (bnc#1012382).
- scsi: sg: fix minor memory leak in error path (bsc#1082979).
- scsi: sg: mitigate read/write abuse (bsc#1101296).
- scsi: target: fix crash with iscsi target and dvd (bsc#1082979).
- scsi: ufs: fix exception event handling (bnc#1012382).
- selftest/seccomp: Fix the flag name SECCOMP_FILTER_FLAG_TSYNC (bnc#1012382).
- selftest/seccomp: Fix the seccomp(2) signature (bnc#1012382).
- skbuff: Unconditionally copy pfmemalloc in __skb_clone() (bnc#1012382).
- smsc75xx: Add workaround for gigabit link up hardware errata (bsc#1100132).
- smsc95xx: Configure pause time to 0xffff when tx flow control enabled (bsc#1085536).
- squashfs: be more careful about metadata corruption (bnc#1012382).
- squashfs: more metadata hardening (bnc#1012382).
- squashfs: more metadata hardenings (bnc#1012382).
- staging: android: ion: Return an ERR_PTR in ion_map_kernel (bnc#1012382).
- staging: comedi: quatech_daqp_cs: fix no-op loop daqp_ao_insn_write() (bnc#1012382).
- tcp: add max_quickacks param to tcp_incr_quickack and tcp_enter_quickack_mode (bnc#1012382).
- tcp: add one more quick ack after after ECN events (bnc#1012382).
- tcp: do not aggressively quick ack after ECN events (bnc#1012382).
- tcp: do not cancel delay-AcK on DCTCP special ACK (bnc#1012382).
- tcp: do not delay ACK in DCTCP upon CE status change (bnc#1012382).
- tcp: do not force quickack when receiving out-of-order packets (bnc#1012382).
- tcp: fix dctcp delayed ACK schedule (bnc#1012382).
- tcp: fix Fast Open key endianness (bnc#1012382).
- tcp: helpers to send special DCTCP ack (bnc#1012382).
- tcp: prevent bogus FRTO undos with non-SACK flows (bnc#1012382).
- tcp: refactor tcp_ecn_check_ce to remove sk type cast (bnc#1012382).
- tg3: Add higher cpu clock for 5762 (bnc#1012382).
- thermal: exynos: fix setting rising_threshold for Exynos5433 (bnc#1012382).
- tools build: fix # escaping in .cmd files for future Make (bnc#1012382).
- tracing: Fix double free of event_trigger_data (bnc#1012382).
- tracing: Fix missing return symbol in function_graph output (bnc#1012382).
- tracing: Fix possible double free in event_enable_trigger_func() (bnc#1012382).
- tracing/kprobes: Fix trace_probe flags on enable_trace_kprobe() failure (bnc#1012382).
- tracing: Quiet gcc warning about maybe unused link variable (bnc#1012382).
- tty: Fix data race in tty_insert_flip_string_fixed_flag (bnc#1012382).
- turn off -Wattribute-alias (bnc#1012382).
- ubi: Be more paranoid while seaching for the most recent Fastmap (bnc#1012382).
- ubi: fastmap: Correctly handle interrupted erasures in EBA (bnc#1012382).
- ubi: fastmap: Erase outdated anchor PEBs during attach (bnc#1012382).
- ubi: Fix Fastmap's update_vol() (bnc#1012382).
- ubi: Fix races around ubi_refill_pools() (bnc#1012382).
- ubi: Introduce vol_ignored() (bnc#1012382).
- ubi: Rework Fastmap attach base code (bnc#1012382).
- uprobes/x86: Remove incorrect WARN_ON() in uprobe_init_insn() (bnc#1012382).
- usb: cdc_acm: Add quirk for Castles VEGA3000 (bnc#1012382).
- usb: cdc_acm: Add quirk for Uniden UBC125 scanner (bnc#1012382).
- usb: core: handle hub C_PORT_OVER_CURRENT condition (bsc#1100132).
- usb: gadget: f_fs: Only return delayed status when len is 0 (bnc#1012382).
- usb: hub: Do not wait for connect state at resume for powered-off ports (bnc#1012382).
- usbip: usbip_detach: Fix memory, udev context and udev leak (bnc#1012382).
- usb: quirks: add delay quirks for Corsair Strafe (bnc#1012382).
- USB: serial: ch341: fix type promotion bug in ch341_control_in() (bnc#1012382).
- USB: serial: cp210x: add another USB ID for Qivicon ZigBee stick (bnc#1012382).
- USB: serial: cp210x: add CESINEL device ids (bnc#1012382).
- USB: serial: cp210x: add Silicon Labs IDs for Windows Update (bnc#1012382).
- USB: serial: keyspan_pda: fix modem-status error handling (bnc#1012382).
- USB: serial: mos7840: fix status-register error handling (bnc#1012382).
- USB: yurex: fix out-of-bounds uaccess in read handler (bnc#1012382).
- vfio: platform: Fix reset module leak in error path (bsc#1102211).
- vfs: add the sb_start_intwrite_trylock() helper (bsc#1101841).
- vhost_net: validate sock before trying to put its fd (bnc#1012382).
- virtio_balloon: fix another race between migration and ballooning (bnc#1012382).
- vmw_balloon: fix inflation with batching (bnc#1012382).
- vmxnet3: add receive data ring support (bsc#1091860 bsc#1098253).
- vmxnet3: add support for get_coalesce, set_coalesce ethtool operations (bsc#1091860 bsc#1098253).
- vmxnet3: allow variable length transmit data ring buffer (bsc#1091860 bsc#1098253).
- vmxnet3: avoid assumption about invalid dma_pa in vmxnet3_set_mc() (bsc#1091860 bsc#1098253).
- vmxnet3: avoid format strint overflow warning (bsc#1091860 bsc#1098253).
- vmxnet3: avoid xmit reset due to a race in vmxnet3 (bsc#1091860 bsc#1098253).
- vmxnet3: fix incorrect dereference when rxvlan is disabled (bsc#1091860 bsc#1098253).
- vmxnet3: fix non static symbol warning (bsc#1091860 bsc#1098253).
- vmxnet3: fix tx data ring copy for variable size (bsc#1091860 bsc#1098253).
- vmxnet3: increase default rx ring sizes (bsc#1091860 bsc#1098253).
- vmxnet3: introduce command to register memory region (bsc#1091860 bsc#1098253).
- vmxnet3: introduce generalized command interface to configure the device (bsc#1091860 bsc#1098253).
- vmxnet3: prepare for version 3 changes (bsc#1091860 bsc#1098253).
- vmxnet3: remove redundant initialization of pointer 'rq' (bsc#1091860 bsc#1098253).
- vmxnet3: remove unused flag 'rxcsum' from struct vmxnet3_adapter (bsc#1091860 bsc#1098253).
- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1091860 bsc#1098253).
- vmxnet3: set the DMA mask before the first DMA map operation (bsc#1091860 bsc#1098253).
- vmxnet3: update to version 3 (bsc#1091860 bsc#1098253).
- vmxnet3: use correct flag to indicate LRO feature (bsc#1091860 bsc#1098253).
- vmxnet3: use DMA memory barriers where required (bsc#1091860 bsc#1098253).
- wait: add wait_event_killable_timeout() (bsc#1099792).
- watchdog: da9063: Fix setting/changing timeout (bsc#1100843).
- watchdog: da9063: Fix timeout handling during probe (bsc#1100843).
- watchdog: da9063: Fix updating timeout value (bsc#1100843).
- wlcore: sdio: check for valid platform device data before suspend (bnc#1012382).
- x86/alternatives: Add an auxilary section (bnc#1012382).
- x86/alternatives: Discard dynamic check after init (bnc#1012382).
- x86/amd: do not set X86_BUG_SYSRET_SS_ATTRS when running under Xen (bnc#1012382).
- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).
- x86/asm: Add _ASM_ARG* constants for argument registers to <asm/asm.h> (bnc#1012382).
- x86/asm/entry/32: Simplify pushes of zeroed pt_regs->REGs (bnc#1012382).
- x86/boot: Simplify kernel load address alignment check (bnc#1012382).
- x86/bugs: Respect nospec command line option (bsc#1068032).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu/AMD: Fix erratum 1076 (CPB bit) (bnc#1012382).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343). Update config files.
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpufeature: Add helper macro for mask check macros (bnc#1012382).
- x86/cpufeature: Carve out X86_FEATURE_* (bnc#1012382).
- x86/cpufeature: Get rid of the non-asm goto variant (bnc#1012382).
- x86/cpufeature: Make sure DISABLED/REQUIRED macros are updated (bnc#1012382).
- x86/cpufeature: Move some of the scattered feature bits to x86_capability (bnc#1012382).
- x86/cpufeature: preserve numbers (kabi).
- x86/cpufeature: Replace the old static_cpu_has() with safe variant (bnc#1012382).
- x86/cpufeatures: Add CPUID_7_EDX CPUID leaf (bnc#1012382).
- x86/cpufeatures: Clean up Spectre v2 related CPUID flags (bnc#1012382).
- x86/cpufeature: Speed up cpu_feature_enabled() (bnc#1012382).
- x86/cpufeature: Update cpufeaure macros (bnc#1012382).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Make alternative_msr_write work for 32-bit code (bnc#1012382).
- x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6 (bnc#1012382).
- x86/cpu: Provide a config option to disable static_cpu_has (bnc#1012382).
- x86/cpu: Re-apply forced caps every time CPU caps are re-read (bnc#1012382).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/entry/64/compat: Clear registers for compat syscalls, to reduce speculation attack surface (bnc#1012382).
- x86/entry/64: Remove %ebx handling from error_entry/exit (bnc#1102715).
- x86/fpu: Add an XSTATE_OP() macro (bnc#1012382).
- x86/fpu: Get rid of xstate_fault() (bnc#1012382).
- x86/headers: Do not include asm/processor.h in asm/atomic.h (bnc#1012382).
- x86/irqflags: Provide a declaration for native_save_fl (git-fixes).
- x86/mce: Fix incorrect 'Machine check from unknown source' message (bnc#1012382).
- x86/MCE: Remove min interval polling limitation (bnc#1012382).
- x86/mm: Give each mm TLB flush generation a unique ID (bnc#1012382).
- x86/mm/pkeys: Fix mismerge of protection keys CPUID bits (bnc#1012382).
- x86/mm: Simplify p[g4um]d_page() macros (bnc#1087081).
- x86/paravirt: Make native_save_fl() extern inline (bnc#1012382).
- x86/process: Correct and optimize TIF_BLOCKSTEP switch (bnc#1012382).
- x86/process: Optimize TIF checks in __switch_to_xtra() (bnc#1012382).
- x86/process: Optimize TIF_NOTSC switch (bnc#1012382).
- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/spectre_v2: Do not check microcode versions when running under hypervisors (bnc#1012382).
- x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support (bnc#1012382).
- x86/speculation: Add <asm/msr-index.h> dependency (bnc#1012382).
- x86/speculation: Clean up various Spectre related details (bnc#1012382).
- x86/speculation: Correct Speculation Control microcode blacklist again (bnc#1012382).
- x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPP (bnc#1012382).
- x86/speculation: Update Speculation Control microcode blacklist (bnc#1012382).
- x86/speculation: Use IBRS if available before calling into firmware (bnc#1012382).
- x86/speculation: Use Indirect Branch Prediction Barrier in context switch (bnc#1012382).
- x86/topology: Add topology_max_smt_threads() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- x86/vdso: Use static_cpu_has() (bnc#1012382).
- x86/xen: Add call of speculative_store_bypass_ht_init() to PV paths (bnc#1012382).
- xen/grant-table: log the lack of grants (bnc#1085042).
- xen-netfront: Fix mismatched rtnl_unlock (bnc#1101658).
- xen-netfront: Update features after registering netdev (bnc#1101658).
- xen-netfront: wait xenbus state change when load module manually (bnc#1012382).
- xen: set cpu capabilities from xen_start_kernel() (bnc#1012382).
- xhci: Fix perceived dead host due to runtime suspend race with event handler (bnc#1012382).
- xhci: xhci-mem: off by one in xhci_stream_id_to_ring() (bnc#1012382).
Patchnames
SUSE-SLE-RT-12-SP3-2018-1827
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP3 RT kernel was updated to 4.4.147 to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bnc#1102851 bsc#1103580).\n- CVE-2018-10876: A flaw was found in the ext4 filesystem code. A use-after-free was possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image. (bnc#1099811)\n- CVE-2018-10877: The ext4 filesystem was vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image. (bnc#1099846)\n- CVE-2018-10878: A flaw was found in the ext4 filesystem. A local user could cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image. (bnc#1099813)\n- CVE-2018-10879: A flaw was found in the ext4 filesystem. A local user could cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image. (bnc#1099844)\n- CVE-2018-10880: Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service. (bnc#1099845)\n- CVE-2018-10881: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099864)\n- CVE-2018-10882: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image. (bnc#1099849)\n- CVE-2018-10883: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099863)\n- CVE-2018-14734: drivers/infiniband/core/ucma.c allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).\n- CVE-2018-3620: Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis (bnc#1087081).\n- CVE-2018-3646: Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis (bnc#1089343 bnc#1104365).\n- CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bnc#1102340).\n- CVE-2018-5391 aka \u0027FragmentSmack\u0027: A flaw in the IP packet reassembly could be used by remote attackers to consume lots of CPU time (bnc#1103097).\n- CVE-2018-9363: A buffer overflow in bluetooth HID report processing could be used by malicious bluetooth devices to crash the kernel or potentially execute code (bnc#1105292).\n\nThe following non-security bugs were fixed:\n\n- acpi / pci: Bail early in acpi_pci_add_bus() if there is no ACPI handle (bnc#1012382).\n- Add support for 5,25,50, and 100G to 802.3ad bonding driver (bsc#1096978)\n- ahci: Disable LPM on Lenovo 50 series laptops with a too old BIOS (bnc#1012382).\n- alsa: emu10k1: add error handling for snd_ctl_add (bnc#1012382).\n- alsa: emu10k1: Rate-limit error messages about page errors (bnc#1012382).\n- alsa: fm801: add error handling for snd_ctl_add (bnc#1012382).\n- alsa: hda/ca0132: fix build failure when a local macro is defined (bnc#1012382).\n- alsa: rawmidi: Change resized buffers atomically (bnc#1012382).\n- alsa: usb-audio: Apply rate limit to warning messages in URB complete callback (bnc#1012382).\n- arc: Fix CONFIG_SWAP (bnc#1012382).\n- arc: mm: allow mprotect to make stack mappings executable (bnc#1012382).\n- arm64: do not open code page table entry creation (bsc#1102197).\n- arm64: kpti: Use early_param for kpti= command-line option (bsc#1102188).\n- arm64: Make sure permission updates happen for pmd/pud (bsc#1102197).\n- arm: dts: imx6q: Use correct SDMA script for SPI5 core (bnc#1012382).\n- arm: fix put_user() for gcc-8 (bnc#1012382).\n- asoc: dpcm: fix BE dai not hw_free and shutdown (bnc#1012382).\n- asoc: pxa: Fix module autoload for platform drivers (bnc#1012382).\n- ath10k: fix rfc1042 header retrieval in QCA4019 with eth decap mode (bnc#1012382).\n- ath: Add regulatory mapping for APL13_WORLD (bnc#1012382).\n- ath: Add regulatory mapping for APL2_FCCA (bnc#1012382).\n- ath: Add regulatory mapping for Bahamas (bnc#1012382).\n- ath: Add regulatory mapping for Bermuda (bnc#1012382).\n- ath: Add regulatory mapping for ETSI8_WORLD (bnc#1012382).\n- ath: Add regulatory mapping for FCC3_ETSIC (bnc#1012382).\n- ath: Add regulatory mapping for Serbia (bnc#1012382).\n- ath: Add regulatory mapping for Tanzania (bnc#1012382).\n- ath: Add regulatory mapping for Uganda (bnc#1012382).\n- atm: zatm: Fix potential Spectre v1 (bnc#1012382).\n- audit: allow not equal op for audit by executable (bnc#1012382).\n- bcache: add backing_request_endio() for bi_end_io (bsc#1064232).\n- bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1064232).\n- bcache: add io_disable to struct cached_dev (bsc#1064232).\n- bcache: add journal statistic (bsc#1076110).\n- bcache: Add __printf annotation to __bch_check_keys() (bsc#1064232).\n- bcache: add stop_when_cache_set_failed option to backing device (bsc#1064232).\n- bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1064232).\n- bcache: Annotate switch fall-through (bsc#1064232).\n- bcache: closures: move control bits one bit right (bsc#1076110).\n- bcache: correct flash only vols (check all uuids) (bsc#1064232).\n- bcache: count backing device I/O error for writeback I/O (bsc#1064232).\n- bcache: Fix a compiler warning in bcache_device_init() (bsc#1064232).\n- bcache: fix cached_dev-\u003ecount usage for bch_cache_set_error() (bsc#1064232).\n- bcache: fix crashes in duplicate cache device register (bsc#1076110).\n- bcache: fix error return value in memory shrink (bsc#1064232).\n- bcache: fix high CPU occupancy during journal (bsc#1076110).\n- bcache: Fix, improve efficiency of closure_sync() (bsc#1076110).\n- bcache: fix inaccurate io state for detached bcache devices (bsc#1064232).\n- bcache: fix incorrect sysfs output value of strip size (bsc#1064232).\n- bcache: Fix indentation (bsc#1064232).\n- bcache: Fix kernel-doc warnings (bsc#1064232).\n- bcache: fix misleading error message in bch_count_io_errors() (bsc#1064232).\n- bcache: fix using of loop variable in memory shrink (bsc#1064232).\n- bcache: fix writeback target calc on large devices (bsc#1076110).\n- bcache: fix wrong return value in bch_debug_init() (bsc#1076110).\n- bcache: mark closure_sync() __sched (bsc#1076110).\n- bcache: move closure debug file into debug directory (bsc#1064232).\n- bcache: reduce cache_set devices iteration by devices_max_used (bsc#1064232).\n- bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1064232).\n- bcache: Remove an unused variable (bsc#1064232).\n- bcache: ret IOERR when read meets metadata error (bsc#1076110).\n- bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1064232).\n- bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1064232).\n- bcache: set dc-\u003eio_disable to true in conditional_stop_bcache_device() (bsc#1064232).\n- bcache: set error_limit correctly (bsc#1064232).\n- bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1064232).\n- bcache: stop bcache device when backing device is offline (bsc#1064232).\n- bcache: stop dc-\u003ewriteback_rate_update properly (bsc#1064232).\n- bcache: stop writeback thread after detaching (bsc#1076110).\n- bcache: store disk name in struct cache and struct cached_dev (bsc#1064232).\n- bcache: Suppress more warnings about set-but-not-used variables (bsc#1064232).\n- bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1064232).\n- bcache: Use PTR_ERR_OR_ZERO() (bsc#1076110).\n- bcm63xx_enet: correct clock usage (bnc#1012382).\n- bcm63xx_enet: do not write to random DMA channel on BCM6345 (bnc#1012382).\n- blkcg: simplify statistic accumulation code (bsc#1082979).\n- block: copy ioprio in __bio_clone_fast() (bsc#1082653).\n- block: do not use interruptible wait anywhere (bnc#1012382).\n- block/swim: Fix array bounds check (bsc#1082979).\n- bluetooth: btusb: Add a new Realtek 8723DE ID 2ff8:b011 (bnc#1012382).\n- bluetooth: hci_qca: Fix \u0027Sleep inside atomic section\u0027 warning (bnc#1012382).\n- bpf: fix loading of BPF_MAXINSNS sized programs (bsc#1012382).\n- bpf: fix references to free_bpf_prog_info() in comments (bnc#1012382).\n- bpf, x64: fix memleak when not converging after image (bsc#1012382).\n- brcmfmac: Add support for bcm43364 wireless chipset (bnc#1012382).\n- btrfs: add barriers to btrfs_sync_log before log_commit_wait wakeups (bnc#1012382).\n- btrfs: Do not remove block group still has pinned down bytes (bsc#1086457).\n- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bnc#1012382).\n- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf (git-fixes).\n- cachefiles: Fix missing clear of the CACHEFILES_OBJECT_ACTIVE flag (bsc#1099858).\n- cachefiles: Fix refcounting bug in backing-file read monitoring (bsc#1099858).\n- cachefiles: Wait rather than BUG\u0027ing on \u0027Unexpected object collision\u0027 (bsc#1099858).\n- can: ems_usb: Fix memory leak on ems_usb_disconnect() (bnc#1012382).\n- can: xilinx_can: fix device dropping off bus on RX overrun (bnc#1012382).\n- can: xilinx_can: fix incorrect clear of non-processed interrupts (bnc#1012382).\n- can: xilinx_can: fix recovery from error states not being propagated (bnc#1012382).\n- can: xilinx_can: fix RX loop if RXNEMP is asserted without RXOK (bnc#1012382).\n- can: xilinx_can: fix RX overflow interrupt not being enabled (bnc#1012382).\n- can: xilinx_can: keep only 1-2 frames in TX FIFO to fix TX accounting (bnc#1012382).\n- cifs: fix bad/NULL ptr dereferencing in SMB2_sess_setup() (bsc#1090123).\n- cifs: Fix infinite loop when using hard mount option (bnc#1012382).\n- clk: tegra: Fix PLL_U post divider and initial rate on Tegra30 (bnc#1012382).\n- compiler, clang: always inline when CONFIG_OPTIMIZE_INLINING is disabled (bnc#1012382).\n- compiler, clang: properly override \u0027inline\u0027 for clang (bnc#1012382).\n- compiler, clang: suppress warning for unused static inline functions (bnc#1012382).\n- compiler-gcc.h: Add __attribute__((gnu_inline)) to all inline declarations (bnc#1012382).\n- cpu/hotplug: Add sysfs state interface (bsc#1089343).\n- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).\n- cpu/hotplug: Split do_cpu_down() (bsc#1089343).\n- crypto: authenc - do not leak pointers to authenc keys (bnc#1012382).\n- crypto: authencesn - do not leak pointers to authenc keys (bnc#1012382).\n- crypto: crypto4xx - fix crypto4xx_build_pdr, crypto4xx_build_sdr leak (bnc#1012382).\n- crypto: crypto4xx - remove bad list_del (bnc#1012382).\n- crypto: padlock-aes - Fix Nano workaround data corruption (bnc#1012382).\n- disable loading f2fs module on PAGE_SIZE \u003e 4KB (bnc#1012382).\n- dmaengine: pxa_dma: remove duplicate const qualifier (bnc#1012382).\n- dma-iommu: Fix compilation when !CONFIG_IOMMU_DMA (bnc#1012382).\n- dm thin metadata: remove needless work from __commit_transaction (bsc#1082979).\n- documentation/spec_ctrl: Do some minor cleanups (bnc#1012382).\n- drbd: fix access after free (bnc#1012382).\n- driver core: Partially revert \u0027driver core: correct device\u0027s shutdown order\u0027 (bnc#1012382).\n- drm: Add DP PSR2 sink enable bit (bnc#1012382).\n- drm/atomic: Handling the case when setting old crtc for plane (bnc#1012382).\n- drm/cirrus: Use drm_framebuffer_put to avoid kernel oops in clean-up (bsc#1101822).\n- drm/gma500: fix psb_intel_lvds_mode_valid()\u0027s return type (bnc#1012382).\n- drm/msm: Fix possible null dereference on failure of get_pages() (bsc#1102394).\n- drm/radeon: fix mode_valid\u0027s return type (bnc#1012382).\n- drm: re-enable error handling (bsc#1103884).\n- esp6: fix memleak on error path in esp6_input (git-fixes).\n- ext4: add more inode number paranoia checks (bnc#1012382).\n- ext4: add more mount time checks of the superblock (bnc#1012382).\n- ext4: always check block group bounds in ext4_init_block_bitmap() (bnc#1012382).\n- ext4: check for allocation block validity with block group locked (bsc#1104495).\n- ext4: check superblock mapped prior to committing (bnc#1012382).\n- ext4: clear i_data in ext4_inode_info when removing inline data (bnc#1012382).\n- ext4: do not update s_last_mounted of a frozen fs (bsc#1101841).\n- ext4: factor out helper ext4_sample_last_mounted() (bsc#1101841).\n- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).\n- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).\n- ext4: fix inline data updates with checksums enabled (bsc#1104494).\n- ext4: include the illegal physical block in the bad map ext4_error msg (bnc#1012382).\n- ext4: make sure bitmaps and the inode table do not overlap with bg descriptors (bnc#1012382).\n- ext4: only look at the bg_flags field if it is valid (bnc#1012382).\n- ext4: verify the depth of extent tree in ext4_find_extent() (bnc#1012382).\n- f2fs: fix to do not trigger writeback during recovery (bnc#1012382).\n- fat: fix memory allocation failure handling of match_strdup() (bnc#1012382).\n- fscache: Allow cancelled operations to be enqueued (bsc#1099858).\n- fscache: Fix reference overput in fscache_attach_object() error handling (bsc#1099858).\n- genirq: Make force irq threading setup more robust (bsc#1082979).\n- hid: debug: check length before copy_to_user() (bnc#1012382).\n- hid: hiddev: fix potential Spectre v1 (bnc#1012382).\n- hid: hid-plantronics: Re-resend Update to map button for PTT products (bnc#1012382).\n- hid: i2c-hid: check if device is there before really probing (bnc#1012382).\n- hid: i2c-hid: Fix \u0027incomplete report\u0027 noise (bnc#1012382).\n- hid: usbhid: add quirk for innomedia INNEX GENESIS/ATARI adapter (bnc#1012382).\n- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bnc#1012382).\n- i2c: imx: Fix reinit_completion() use (bnc#1012382).\n- i2c: rcar: fix resume by always initializing registers before transfer (bnc#1012382).\n- ib/isert: fix T10-pi check mask setting (bsc#1082979).\n- ibmasm: do not write out of bounds in read handler (bnc#1012382).\n- ibmvnic: Fix error recovery on login failure (bsc#1101789).\n- ibmvnic: Remove code to request error information (bsc#1104174).\n- ibmvnic: Revise RX/TX queue error messages (bsc#1101331).\n- ibmvnic: Update firmware error reporting with cause string (bsc#1104174).\n- inet: frag: enforce memory limits earlier (bnc#1012382 bsc#970506).\n- input: elan_i2c - add ACPI ID for lenovo ideapad 330 (bnc#1012382).\n- input: elan_i2c - add another ACPI ID for Lenovo Ideapad 330-15AST (bnc#1012382).\n- input: i8042 - add Lenovo LaVie Z to the i8042 reset list (bnc#1012382).\n- ipconfig: Correctly initialise ic_nameservers (bnc#1012382).\n- ip: hash fragments consistently (bnc#1012382).\n- ip: in cmsg IP(V6)_ORIGDSTADDR call pskb_may_pull (bnc#1012382).\n- ipv4: Fix error return value in fib_convert_metrics() (bnc#1012382).\n- ipv4: remove BUG_ON() from fib_compute_spec_dst (bnc#1012382).\n- ipv4: Return EINVAL when ping_group_range sysctl does not map to user ns (bnc#1012382).\n- ipv6: fix useless rol32 call on hash (bnc#1012382).\n- iw_cxgb4: correctly enforce the max reg_mr depth (bnc#1012382).\n- iwlwifi: pcie: fix race in Rx buffer allocator (bnc#1012382).\n- jbd2: do not mark block as modified if the handle is out of credits (bnc#1012382).\n- kabi protect includes in include/linux/inet.h (bsc#1095643).\n- KABI protect net/core/utils.c includes (bsc#1095643).\n- kABI: protect struct loop_device (kabi).\n- kABI: reexport tcp_send_ack (kabi).\n- kABI: reintroduce __static_cpu_has_safe (kabi).\n- kabi/severities: add \u0027drivers/md/bcache/* PASS\u0027 since no one uses symboles expoted by bcache.\n- kbuild: fix # escaping in .cmd files for future Make (bnc#1012382).\n- KEYS: DNS: fix parsing multiple options (bnc#1012382).\n- kmod: fix wait on recursive loop (bsc#1099792).\n- kmod: reduce atomic operations on kmod_concurrent and simplify (bsc#1099792).\n- kmod: throttle kmod thread limit (bsc#1099792).\n- kprobes/x86: Do not modify singlestep buffer while resuming (bnc#1012382).\n- kthread, tracing: Do not expose half-written comm when creating kthreads (bsc#1104897).\n- kvm: arm/arm64: Drop resource size check for GICV window (bsc#1102215).\n- kvm: arm/arm64: Set dist-\u003espis to NULL after kfree (bsc#1102214).\n- kvm/Eventfd: Avoid crash when assign and deassign specific eventfd in parallel (bnc#1012382).\n- kvm: x86: vmx: fix vpid leak (bnc#1012382).\n- libata: do not try to pass through NCQ commands to non-NCQ devices (bsc#1082979).\n- libata: Fix command retry decision (bnc#1012382).\n- lib/rhashtable: consider param-\u003emin_size when setting initial table size (bnc#1012382).\n- loop: add recursion validation to LOOP_CHANGE_FD (bnc#1012382).\n- loop: remember whether sysfs_create_group() was done (bnc#1012382).\n- md: fix NULL dereference of mddev-\u003epers in remove_and_add_spares() (bnc#1012382).\n- media: cx25840: Use subdev host data for PLL override (bnc#1012382).\n- media: omap3isp: fix unbalanced dma_iommu_mapping (bnc#1012382).\n- media: rcar_jpu: Add missing clk_disable_unprepare() on error in jpu_open() (bnc#1012382).\n- media: saa7164: Fix driver name in debug output (bnc#1012382).\n- media: si470x: fix __be16 annotations (bnc#1012382).\n- media: siano: get rid of __le32/__le16 cast warnings (bnc#1012382).\n- media: videobuf2-core: do not call memop \u0027finish\u0027 when queueing (bnc#1012382).\n- memory: tegra: Apply interrupts mask per SoC (bnc#1012382).\n- memory: tegra: Do not handle spurious interrupts (bnc#1012382).\n- mfd: cros_ec: Fail early if we cannot identify the EC (bnc#1012382).\n- microblaze: Fix simpleImage format generation (bnc#1012382).\n- mmc: dw_mmc: fix card threshold control configuration (bsc#1102203).\n- mm: check VMA flags to avoid invalid PROT_NONE NUMA balancing (bsc#1097771).\n- mm: hugetlb: yield when prepping struct pages (bnc#1012382).\n- mm: memcg: fix use after free in mem_cgroup_iter() (bnc#1012382).\n- mm/slub.c: add __printf verification to slab_err() (bnc#1012382).\n- mm: vmalloc: avoid racy handling of debugobjects in vunmap (bnc#1012382).\n- mtd: cfi_cmdset_0002: Change definition naming to retry write operation (bnc#1012382).\n- mtd: cfi_cmdset_0002: Change erase functions to check chip good only (bnc#1012382).\n- mtd: cfi_cmdset_0002: Change erase functions to retry for error (bnc#1012382).\n- mtd: rawnand: fsl_ifc: fix FSL NAND driver to read all ONFI parameter pages (bnc#1012382).\n- mtd: rawnand: mxc: set spare area size register explicitly (bnc#1012382).\n- mtd: ubi: wl: Fix error return code in ubi_wl_init() (git-fixes).\n- mwifiex: correct histogram data with appropriate index (bnc#1012382).\n- mwifiex: handle race during mwifiex_usb_disconnect (bnc#1012382).\n- net: cxgb3_main: fix potential Spectre v1 (bnc#1012382).\n- net: dccp: avoid crash in ccid3_hc_rx_send_feedback() (bnc#1012382).\n- net: dccp: switch rx_tstamp_last_feedback to monotonic clock (bnc#1012382).\n- net: Do not copy pfmemalloc flag in __copy_skb_header() (bnc#1012382).\n- net: dsa: Do not suspend/resume closed slave_dev (bnc#1012382).\n- netfilter: ebtables: reject non-bridge targets (bnc#1012382).\n- netfilter: ipset: List timing out entries with \u0027timeout 1\u0027 instead of zero (bnc#1012382).\n- netfilter: ipvs: do not create conn for ABORT packet in sctp_conn_schedule (bsc#1102797).\n- netfilter: ipvs: fix the issue that sctp_conn_schedule drops non-INIT packet (bsc#1102797).\n- netfilter: nf_log: do not hold nf_log_mutex during user access (bnc#1012382).\n- netfilter: nf_queue: augment nfqa_cfg_policy (bnc#1012382).\n- netfilter: nf_tables: use WARN_ON_ONCE instead of BUG_ON in nft_do_chain() (bnc#1012382).\n- netfilter: x_tables: initialise match/target check parameter struct (bnc#1012382).\n- net: fix amd-xgbe flow-control issue (bnc#1012382).\n- net/ipv4: Set oif in fib_compute_spec_dst (bnc#1012382).\n- net: lan78xx: fix rx handling before first packet is send (bnc#1012382).\n- netlink: Do not shift on 64 for ngroups (bnc#1012382).\n- netlink: Do not shift with UB on nlk-\u003engroups (bnc#1012382).\n- netlink: Do not subscribe to non-existent groups (bnc#1012382).\n- netlink: Fix spectre v1 gadget in netlink_create() (bnc#1012382).\n- net/mlx4_core: Save the qpn from the input modifier in RST2INIT wrapper (bnc#1012382).\n- net/mlx5: Fix command interface race in polling mode (bnc#1012382).\n- net/mlx5: Fix incorrect raw command length parsing (bnc#1012382).\n- net: mvneta: fix the Rx desc DMA address in the Rx path (bsc#1102207).\n- net/nfc: Avoid stalls when nfc_alloc_send_skb() returned NULL (bnc#1012382).\n- net: off by one in inet6_pton() (bsc#1095643).\n- net: phy: fix flag masking in __set_phy_supported (bnc#1012382).\n- net: phy: marvell: Use strlcpy() for ethtool::get_strings (bsc#1102205).\n- net_sched: blackhole: tell upper qdisc about dropped packets (bnc#1012382).\n- net: socket: fix potential spectre v1 gadget in socketcall (bnc#1012382).\n- net: stmmac: align DMA stuff to largest cache line length (bnc#1012382).\n- net: sungem: fix rx checksum support (bnc#1012382).\n- net/utils: generic inet_pton_with_scope helper (bsc#1095643).\n- net: vmxnet3: use new api ethtool_{get|set}_link_ksettings (bsc#1091860 bsc#1098253).\n- nfsd: fix potential use-after-free in nfsd4_decode_getdeviceinfo (bnc#1012382).\n- nohz: Fix local_timer_softirq_pending() (bnc#1012382).\n- n_tty: Access echo_* variables carefully (bnc#1012382).\n- n_tty: Fix stall at n_tty_receive_char_special() (bnc#1012382).\n- null_blk: use sector_div instead of do_div (bsc#1082979).\n- nvme-pci: initialize queue memory before interrupts (bnc#1012382).\n- nvme-rdma: Check remotely invalidated rkey matches our expected rkey (bsc#1092001).\n- nvme-rdma: default MR page size to 4k (bsc#1092001).\n- nvme-rdma: do not complete requests before a send work request has completed (bsc#1092001).\n- nvme-rdma: do not suppress send completions (bsc#1092001).\n- nvme-rdma: Fix command completion race at error recovery (bsc#1090435).\n- nvme-rdma: make nvme_rdma_[create|destroy]_queue_ib symmetrical (bsc#1092001).\n- nvme-rdma: use inet_pton_with_scope helper (bsc#1095643).\n- nvme-rdma: Use mr pool (bsc#1092001).\n- nvme-rdma: wait for local invalidation before completing a request (bsc#1092001).\n- ocfs2: subsystem.su_mutex is required while accessing the item-\u003eci_parent (bnc#1012382).\n- pci: ibmphp: Fix use-before-set in get_max_bus_speed() (bsc#1100132).\n- pci: pciehp: Request control of native hotplug only if supported (bnc#1012382).\n- pci: Prevent sysfs disable of device while driver is attached (bnc#1012382).\n- perf: fix invalid bit in diagnostic entry (bnc#1012382).\n- perf tools: Move syscall number fallbacks from perf-sys.h to tools/arch/x86/include/asm/ (bnc#1012382).\n- perf/x86/intel/uncore: Correct fixed counter index check for NHM (bnc#1012382).\n- perf/x86/intel/uncore: Correct fixed counter index check in generic code (bnc#1012382).\n- pinctrl: at91-pio4: add missing of_node_put (bnc#1012382).\n- pm / hibernate: Fix oops at snapshot_write() (bnc#1012382).\n- powerpc/32: Add a missing include header (bnc#1012382).\n- powerpc/64: Initialise thread_info for emergency stacks (bsc#1094244, bsc#1100930, bsc#1102683).\n- powerpc/64s: Fix compiler store ordering to SLB shadow area (bnc#1012382).\n- powerpc/8xx: fix invalid register expression in head_8xx.S (bnc#1012382).\n- powerpc/chrp/time: Make some functions static, add missing header include (bnc#1012382).\n- powerpc/embedded6xx/hlwd-pic: Prevent interrupts from being handled by Starlet (bnc#1012382).\n- powerpc/fadump: handle crash memory ranges array index overflow (bsc#1103269).\n- powerpc/fadump: merge adjacent memory ranges to reduce PT_LOAD segements (bsc#1103269).\n- powerpc/powermac: Add missing prototype for note_bootable_part() (bnc#1012382).\n- powerpc/powermac: Mark variable x as unused (bnc#1012382).\n- provide special timeout module parameters for EC2 (bsc#1065364).\n- ptp: fix missing break in switch (bnc#1012382).\n- qed: Limit msix vectors in kdump kernel to the minimum required count (bnc#1012382).\n- r8152: napi hangup fix after disconnect (bnc#1012382).\n- random: mix rdrand with entropy sent in from userspace (bnc#1012382).\n- rdma/mad: Convert BUG_ONs to error flows (bnc#1012382).\n- rdma/ocrdma: Fix an error code in ocrdma_alloc_pd() (bsc#1082979).\n- rdma/ocrdma: Fix error codes in ocrdma_create_srq() (bsc#1082979).\n- rdma/ucm: Mark UCM interface as BROKEN (bnc#1012382).\n- rds: avoid unenecessary cong_update in loop transport (bnc#1012382).\n- regulator: pfuze100: add .is_enable() for pfuze100_swb_regulator_ops (bnc#1012382).\n- Remove broken patches for dac9063 watchdog (bsc#1100843)\n- restore cond_resched() in shrink_dcache_parent() (bsc#1098599).\n- Revert \u0027block-cancel-workqueue-entries-on-blk_mq_freeze_queue\u0027 (bsc#1103717)\n- Revert \u0027net: Do not copy pfmemalloc flag in __copy_skb_header()\u0027 (kabi).\n- Revert \u0027sit: reload iphdr in ipip6_rcv\u0027 (bnc#1012382).\n- Revert \u0027skbuff: Unconditionally copy pfmemalloc in __skb_clone()\u0027 (kabi).\n- Revert \u0027x86/cpufeature: Move some of the scattered feature bits to x86_capability\u0027 (kabi).\n- Revert \u0027x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6\u0027 (kabi).\n- Revert \u0027x86/mm: Give each mm TLB flush generation a unique ID\u0027 (kabi).\n- Revert \u0027x86/speculation: Use Indirect Branch Prediction Barrier in context switch\u0027 (kabi).\n- ring_buffer: tracing: Inherit the tracing setting to next ring buffer (bnc#1012382).\n- rsi: Fix \u0027invalid vdd\u0027 warning in mmc (bnc#1012382).\n- rtc: ensure rtc_set_alarm fails when alarms are not supported (bnc#1012382).\n- rtlwifi: rtl8821ae: fix firmware is not ready to run (bnc#1012382).\n- rtnetlink: add rtnl_link_state check in rtnl_configure_link (bnc#1012382).\n- s390: Correct register corruption in critical section cleanup (bnc#1012382).\n- s390/cpum_sf: Add data entry sizes to sampling trailer entry (bnc#1012382).\n- s390/qeth: fix error handling in adapter command callbacks (bnc#1103745, LTC#169699).\n- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).\n- sched/smt: Update sched_smt_present at runtime (bsc#1089343).\n- scsi: 3w-9xxx: fix a missing-check bug (bnc#1012382).\n- scsi: 3w-xxxx: fix a missing-check bug (bnc#1012382).\n- scsi: megaraid_sas: Increase timeout by 1 sec for non-RAID fastpath IOs (bnc#1012382).\n- scsi: megaraid: silence a static checker bug (bnc#1012382).\n- scsi: qla2xxx: Fix ISP recovery on unload (bnc#1012382).\n- scsi: qla2xxx: Return error when TMF returns (bnc#1012382).\n- scsi: qlogicpti: Fix an error handling path in \u0027qpti_sbus_probe()\u0027 (bsc#1082979).\n- scsi: scsi_dh: replace too broad \u0027TP9\u0027 string with the exact models (bnc#1012382).\n- scsi: sg: fix minor memory leak in error path (bsc#1082979).\n- scsi: sg: mitigate read/write abuse (bsc#1101296).\n- scsi: target: fix crash with iscsi target and dvd (bsc#1082979).\n- scsi: ufs: fix exception event handling (bnc#1012382).\n- selftest/seccomp: Fix the flag name SECCOMP_FILTER_FLAG_TSYNC (bnc#1012382).\n- selftest/seccomp: Fix the seccomp(2) signature (bnc#1012382).\n- skbuff: Unconditionally copy pfmemalloc in __skb_clone() (bnc#1012382).\n- smsc75xx: Add workaround for gigabit link up hardware errata (bsc#1100132).\n- smsc95xx: Configure pause time to 0xffff when tx flow control enabled (bsc#1085536).\n- squashfs: be more careful about metadata corruption (bnc#1012382).\n- squashfs: more metadata hardening (bnc#1012382).\n- squashfs: more metadata hardenings (bnc#1012382).\n- staging: android: ion: Return an ERR_PTR in ion_map_kernel (bnc#1012382).\n- staging: comedi: quatech_daqp_cs: fix no-op loop daqp_ao_insn_write() (bnc#1012382).\n- tcp: add max_quickacks param to tcp_incr_quickack and tcp_enter_quickack_mode (bnc#1012382).\n- tcp: add one more quick ack after after ECN events (bnc#1012382).\n- tcp: do not aggressively quick ack after ECN events (bnc#1012382).\n- tcp: do not cancel delay-AcK on DCTCP special ACK (bnc#1012382).\n- tcp: do not delay ACK in DCTCP upon CE status change (bnc#1012382).\n- tcp: do not force quickack when receiving out-of-order packets (bnc#1012382).\n- tcp: fix dctcp delayed ACK schedule (bnc#1012382).\n- tcp: fix Fast Open key endianness (bnc#1012382).\n- tcp: helpers to send special DCTCP ack (bnc#1012382).\n- tcp: prevent bogus FRTO undos with non-SACK flows (bnc#1012382).\n- tcp: refactor tcp_ecn_check_ce to remove sk type cast (bnc#1012382).\n- tg3: Add higher cpu clock for 5762 (bnc#1012382).\n- thermal: exynos: fix setting rising_threshold for Exynos5433 (bnc#1012382).\n- tools build: fix # escaping in .cmd files for future Make (bnc#1012382).\n- tracing: Fix double free of event_trigger_data (bnc#1012382).\n- tracing: Fix missing return symbol in function_graph output (bnc#1012382).\n- tracing: Fix possible double free in event_enable_trigger_func() (bnc#1012382).\n- tracing/kprobes: Fix trace_probe flags on enable_trace_kprobe() failure (bnc#1012382).\n- tracing: Quiet gcc warning about maybe unused link variable (bnc#1012382).\n- tty: Fix data race in tty_insert_flip_string_fixed_flag (bnc#1012382).\n- turn off -Wattribute-alias (bnc#1012382).\n- ubi: Be more paranoid while seaching for the most recent Fastmap (bnc#1012382).\n- ubi: fastmap: Correctly handle interrupted erasures in EBA (bnc#1012382).\n- ubi: fastmap: Erase outdated anchor PEBs during attach (bnc#1012382).\n- ubi: Fix Fastmap\u0027s update_vol() (bnc#1012382).\n- ubi: Fix races around ubi_refill_pools() (bnc#1012382).\n- ubi: Introduce vol_ignored() (bnc#1012382).\n- ubi: Rework Fastmap attach base code (bnc#1012382).\n- uprobes/x86: Remove incorrect WARN_ON() in uprobe_init_insn() (bnc#1012382).\n- usb: cdc_acm: Add quirk for Castles VEGA3000 (bnc#1012382).\n- usb: cdc_acm: Add quirk for Uniden UBC125 scanner (bnc#1012382).\n- usb: core: handle hub C_PORT_OVER_CURRENT condition (bsc#1100132).\n- usb: gadget: f_fs: Only return delayed status when len is 0 (bnc#1012382).\n- usb: hub: Do not wait for connect state at resume for powered-off ports (bnc#1012382).\n- usbip: usbip_detach: Fix memory, udev context and udev leak (bnc#1012382).\n- usb: quirks: add delay quirks for Corsair Strafe (bnc#1012382).\n- USB: serial: ch341: fix type promotion bug in ch341_control_in() (bnc#1012382).\n- USB: serial: cp210x: add another USB ID for Qivicon ZigBee stick (bnc#1012382).\n- USB: serial: cp210x: add CESINEL device ids (bnc#1012382).\n- USB: serial: cp210x: add Silicon Labs IDs for Windows Update (bnc#1012382).\n- USB: serial: keyspan_pda: fix modem-status error handling (bnc#1012382).\n- USB: serial: mos7840: fix status-register error handling (bnc#1012382).\n- USB: yurex: fix out-of-bounds uaccess in read handler (bnc#1012382).\n- vfio: platform: Fix reset module leak in error path (bsc#1102211).\n- vfs: add the sb_start_intwrite_trylock() helper (bsc#1101841).\n- vhost_net: validate sock before trying to put its fd (bnc#1012382).\n- virtio_balloon: fix another race between migration and ballooning (bnc#1012382).\n- vmw_balloon: fix inflation with batching (bnc#1012382).\n- vmxnet3: add receive data ring support (bsc#1091860 bsc#1098253).\n- vmxnet3: add support for get_coalesce, set_coalesce ethtool operations (bsc#1091860 bsc#1098253).\n- vmxnet3: allow variable length transmit data ring buffer (bsc#1091860 bsc#1098253).\n- vmxnet3: avoid assumption about invalid dma_pa in vmxnet3_set_mc() (bsc#1091860 bsc#1098253).\n- vmxnet3: avoid format strint overflow warning (bsc#1091860 bsc#1098253).\n- vmxnet3: avoid xmit reset due to a race in vmxnet3 (bsc#1091860 bsc#1098253).\n- vmxnet3: fix incorrect dereference when rxvlan is disabled (bsc#1091860 bsc#1098253).\n- vmxnet3: fix non static symbol warning (bsc#1091860 bsc#1098253).\n- vmxnet3: fix tx data ring copy for variable size (bsc#1091860 bsc#1098253).\n- vmxnet3: increase default rx ring sizes (bsc#1091860 bsc#1098253).\n- vmxnet3: introduce command to register memory region (bsc#1091860 bsc#1098253).\n- vmxnet3: introduce generalized command interface to configure the device (bsc#1091860 bsc#1098253).\n- vmxnet3: prepare for version 3 changes (bsc#1091860 bsc#1098253).\n- vmxnet3: remove redundant initialization of pointer \u0027rq\u0027 (bsc#1091860 bsc#1098253).\n- vmxnet3: remove unused flag \u0027rxcsum\u0027 from struct vmxnet3_adapter (bsc#1091860 bsc#1098253).\n- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1091860 bsc#1098253).\n- vmxnet3: set the DMA mask before the first DMA map operation (bsc#1091860 bsc#1098253).\n- vmxnet3: update to version 3 (bsc#1091860 bsc#1098253).\n- vmxnet3: use correct flag to indicate LRO feature (bsc#1091860 bsc#1098253).\n- vmxnet3: use DMA memory barriers where required (bsc#1091860 bsc#1098253).\n- wait: add wait_event_killable_timeout() (bsc#1099792).\n- watchdog: da9063: Fix setting/changing timeout (bsc#1100843).\n- watchdog: da9063: Fix timeout handling during probe (bsc#1100843).\n- watchdog: da9063: Fix updating timeout value (bsc#1100843).\n- wlcore: sdio: check for valid platform device data before suspend (bnc#1012382).\n- x86/alternatives: Add an auxilary section (bnc#1012382).\n- x86/alternatives: Discard dynamic check after init (bnc#1012382).\n- x86/amd: do not set X86_BUG_SYSRET_SS_ATTRS when running under Xen (bnc#1012382).\n- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).\n- x86/asm: Add _ASM_ARG* constants for argument registers to \u003casm/asm.h\u003e (bnc#1012382).\n- x86/asm/entry/32: Simplify pushes of zeroed pt_regs-\u003eREGs (bnc#1012382).\n- x86/boot: Simplify kernel load address alignment check (bnc#1012382).\n- x86/bugs: Respect nospec command line option (bsc#1068032).\n- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).\n- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu/AMD: Fix erratum 1076 (CPB bit) (bnc#1012382).\n- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343). Update config files.\n- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).\n- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- x86/cpufeature: Add helper macro for mask check macros (bnc#1012382).\n- x86/cpufeature: Carve out X86_FEATURE_* (bnc#1012382).\n- x86/cpufeature: Get rid of the non-asm goto variant (bnc#1012382).\n- x86/cpufeature: Make sure DISABLED/REQUIRED macros are updated (bnc#1012382).\n- x86/cpufeature: Move some of the scattered feature bits to x86_capability (bnc#1012382).\n- x86/cpufeature: preserve numbers (kabi).\n- x86/cpufeature: Replace the old static_cpu_has() with safe variant (bnc#1012382).\n- x86/cpufeatures: Add CPUID_7_EDX CPUID leaf (bnc#1012382).\n- x86/cpufeatures: Clean up Spectre v2 related CPUID flags (bnc#1012382).\n- x86/cpufeature: Speed up cpu_feature_enabled() (bnc#1012382).\n- x86/cpufeature: Update cpufeaure macros (bnc#1012382).\n- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu: Make alternative_msr_write work for 32-bit code (bnc#1012382).\n- x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6 (bnc#1012382).\n- x86/cpu: Provide a config option to disable static_cpu_has (bnc#1012382).\n- x86/cpu: Re-apply forced caps every time CPU caps are re-read (bnc#1012382).\n- x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- x86/entry/64/compat: Clear registers for compat syscalls, to reduce speculation attack surface (bnc#1012382).\n- x86/entry/64: Remove %ebx handling from error_entry/exit (bnc#1102715).\n- x86/fpu: Add an XSTATE_OP() macro (bnc#1012382).\n- x86/fpu: Get rid of xstate_fault() (bnc#1012382).\n- x86/headers: Do not include asm/processor.h in asm/atomic.h (bnc#1012382).\n- x86/irqflags: Provide a declaration for native_save_fl (git-fixes).\n- x86/mce: Fix incorrect \u0027Machine check from unknown source\u0027 message (bnc#1012382).\n- x86/MCE: Remove min interval polling limitation (bnc#1012382).\n- x86/mm: Give each mm TLB flush generation a unique ID (bnc#1012382).\n- x86/mm/pkeys: Fix mismerge of protection keys CPUID bits (bnc#1012382).\n- x86/mm: Simplify p[g4um]d_page() macros (bnc#1087081).\n- x86/paravirt: Make native_save_fl() extern inline (bnc#1012382).\n- x86/process: Correct and optimize TIF_BLOCKSTEP switch (bnc#1012382).\n- x86/process: Optimize TIF checks in __switch_to_xtra() (bnc#1012382).\n- x86/process: Optimize TIF_NOTSC switch (bnc#1012382).\n- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).\n- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).\n- x86/spectre_v2: Do not check microcode versions when running under hypervisors (bnc#1012382).\n- x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support (bnc#1012382).\n- x86/speculation: Add \u003casm/msr-index.h\u003e dependency (bnc#1012382).\n- x86/speculation: Clean up various Spectre related details (bnc#1012382).\n- x86/speculation: Correct Speculation Control microcode blacklist again (bnc#1012382).\n- x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPP (bnc#1012382).\n- x86/speculation: Update Speculation Control microcode blacklist (bnc#1012382).\n- x86/speculation: Use IBRS if available before calling into firmware (bnc#1012382).\n- x86/speculation: Use Indirect Branch Prediction Barrier in context switch (bnc#1012382).\n- x86/topology: Add topology_max_smt_threads() (bsc#1089343).\n- x86/topology: Provide topology_smt_supported() (bsc#1089343).\n- x86/vdso: Use static_cpu_has() (bnc#1012382).\n- x86/xen: Add call of speculative_store_bypass_ht_init() to PV paths (bnc#1012382).\n- xen/grant-table: log the lack of grants (bnc#1085042).\n- xen-netfront: Fix mismatched rtnl_unlock (bnc#1101658).\n- xen-netfront: Update features after registering netdev (bnc#1101658).\n- xen-netfront: wait xenbus state change when load module manually (bnc#1012382).\n- xen: set cpu capabilities from xen_start_kernel() (bnc#1012382).\n- xhci: Fix perceived dead host due to runtime suspend race with event handler (bnc#1012382).\n- xhci: xhci-mem: off by one in xhci_stream_id_to_ring() (bnc#1012382).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-RT-12-SP3-2018-1827", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2596-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2596-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182596-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2596-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1064232", "url": "https://bugzilla.suse.com/1064232" }, { "category": "self", "summary": "SUSE Bug 1065364", "url": "https://bugzilla.suse.com/1065364" }, { "category": "self", "summary": "SUSE Bug 1068032", "url": "https://bugzilla.suse.com/1068032" }, { "category": "self", "summary": "SUSE Bug 1076110", "url": "https://bugzilla.suse.com/1076110" }, { "category": "self", "summary": "SUSE Bug 1082653", "url": "https://bugzilla.suse.com/1082653" }, { "category": "self", "summary": "SUSE Bug 1082979", "url": "https://bugzilla.suse.com/1082979" }, { "category": "self", "summary": "SUSE Bug 1085042", "url": "https://bugzilla.suse.com/1085042" }, { "category": "self", "summary": "SUSE Bug 1085536", "url": "https://bugzilla.suse.com/1085536" }, { "category": "self", "summary": "SUSE Bug 1086457", "url": "https://bugzilla.suse.com/1086457" }, { "category": "self", "summary": "SUSE Bug 1087081", "url": "https://bugzilla.suse.com/1087081" }, { "category": "self", "summary": "SUSE Bug 1089343", "url": "https://bugzilla.suse.com/1089343" }, { "category": "self", "summary": "SUSE Bug 1090123", "url": "https://bugzilla.suse.com/1090123" }, { "category": "self", "summary": "SUSE Bug 1090435", "url": "https://bugzilla.suse.com/1090435" }, { "category": "self", "summary": "SUSE Bug 1091171", "url": "https://bugzilla.suse.com/1091171" }, { "category": "self", "summary": "SUSE Bug 1091860", "url": "https://bugzilla.suse.com/1091860" }, { "category": "self", "summary": "SUSE Bug 1092001", "url": "https://bugzilla.suse.com/1092001" }, { "category": "self", "summary": "SUSE Bug 1094244", "url": "https://bugzilla.suse.com/1094244" }, { "category": "self", "summary": "SUSE Bug 1095643", "url": "https://bugzilla.suse.com/1095643" }, { "category": "self", "summary": "SUSE Bug 1096254", "url": "https://bugzilla.suse.com/1096254" }, { "category": "self", "summary": "SUSE Bug 1096978", "url": "https://bugzilla.suse.com/1096978" }, { "category": "self", "summary": "SUSE Bug 1097771", "url": "https://bugzilla.suse.com/1097771" }, { "category": "self", "summary": "SUSE Bug 1098253", "url": "https://bugzilla.suse.com/1098253" }, { "category": "self", "summary": "SUSE Bug 1098599", "url": "https://bugzilla.suse.com/1098599" }, { "category": "self", "summary": "SUSE Bug 1099792", "url": "https://bugzilla.suse.com/1099792" }, { "category": "self", "summary": "SUSE Bug 1099811", "url": "https://bugzilla.suse.com/1099811" }, { "category": "self", "summary": "SUSE Bug 1099813", "url": "https://bugzilla.suse.com/1099813" }, { "category": "self", "summary": "SUSE Bug 1099844", "url": "https://bugzilla.suse.com/1099844" }, { "category": "self", "summary": "SUSE Bug 1099845", "url": "https://bugzilla.suse.com/1099845" }, { "category": "self", "summary": "SUSE Bug 1099846", "url": "https://bugzilla.suse.com/1099846" }, { "category": "self", "summary": "SUSE Bug 1099849", "url": "https://bugzilla.suse.com/1099849" }, { "category": "self", "summary": "SUSE Bug 1099858", "url": "https://bugzilla.suse.com/1099858" }, { "category": "self", "summary": "SUSE Bug 1099863", "url": "https://bugzilla.suse.com/1099863" }, { "category": "self", "summary": "SUSE Bug 1099864", "url": "https://bugzilla.suse.com/1099864" }, { "category": "self", "summary": "SUSE Bug 1100132", "url": "https://bugzilla.suse.com/1100132" }, { "category": "self", "summary": "SUSE Bug 1100843", "url": "https://bugzilla.suse.com/1100843" }, { "category": "self", "summary": "SUSE Bug 1100930", "url": "https://bugzilla.suse.com/1100930" }, { "category": "self", "summary": "SUSE Bug 1101296", "url": "https://bugzilla.suse.com/1101296" }, { "category": "self", "summary": "SUSE Bug 1101331", "url": "https://bugzilla.suse.com/1101331" }, { "category": "self", "summary": "SUSE Bug 1101658", "url": "https://bugzilla.suse.com/1101658" }, { "category": "self", "summary": "SUSE Bug 1101789", "url": "https://bugzilla.suse.com/1101789" }, { "category": "self", "summary": "SUSE Bug 1101822", "url": "https://bugzilla.suse.com/1101822" }, { "category": "self", "summary": "SUSE Bug 1101841", "url": "https://bugzilla.suse.com/1101841" }, { "category": "self", "summary": "SUSE Bug 1102188", "url": "https://bugzilla.suse.com/1102188" }, { "category": "self", "summary": "SUSE Bug 1102197", "url": "https://bugzilla.suse.com/1102197" }, { "category": "self", "summary": "SUSE Bug 1102203", "url": "https://bugzilla.suse.com/1102203" }, { "category": "self", "summary": "SUSE Bug 1102205", "url": "https://bugzilla.suse.com/1102205" }, { "category": "self", "summary": "SUSE Bug 1102207", "url": "https://bugzilla.suse.com/1102207" }, { "category": "self", "summary": "SUSE Bug 1102211", "url": "https://bugzilla.suse.com/1102211" }, { "category": "self", "summary": "SUSE Bug 1102214", "url": "https://bugzilla.suse.com/1102214" }, { "category": "self", "summary": "SUSE Bug 1102215", "url": "https://bugzilla.suse.com/1102215" }, { "category": "self", "summary": "SUSE Bug 1102340", "url": "https://bugzilla.suse.com/1102340" }, { "category": "self", "summary": "SUSE Bug 1102394", "url": "https://bugzilla.suse.com/1102394" }, { "category": "self", "summary": "SUSE Bug 1102683", "url": "https://bugzilla.suse.com/1102683" }, { "category": "self", "summary": "SUSE Bug 1102715", "url": "https://bugzilla.suse.com/1102715" }, { "category": "self", "summary": "SUSE Bug 1102797", "url": "https://bugzilla.suse.com/1102797" }, { "category": "self", "summary": "SUSE Bug 1102851", "url": "https://bugzilla.suse.com/1102851" }, { "category": "self", "summary": "SUSE Bug 1103097", "url": "https://bugzilla.suse.com/1103097" }, { "category": "self", "summary": "SUSE Bug 1103119", "url": "https://bugzilla.suse.com/1103119" }, { "category": "self", "summary": "SUSE Bug 1103269", "url": "https://bugzilla.suse.com/1103269" }, { "category": "self", "summary": "SUSE Bug 1103445", "url": "https://bugzilla.suse.com/1103445" }, { "category": "self", "summary": "SUSE Bug 1103580", "url": "https://bugzilla.suse.com/1103580" }, { "category": "self", "summary": "SUSE Bug 1103717", "url": "https://bugzilla.suse.com/1103717" }, { "category": "self", "summary": "SUSE Bug 1103745", "url": "https://bugzilla.suse.com/1103745" }, { "category": "self", "summary": "SUSE Bug 1103884", "url": "https://bugzilla.suse.com/1103884" }, { "category": "self", "summary": "SUSE Bug 1104174", "url": "https://bugzilla.suse.com/1104174" }, { "category": "self", "summary": "SUSE Bug 1104319", "url": "https://bugzilla.suse.com/1104319" }, { "category": "self", "summary": "SUSE Bug 1104365", "url": "https://bugzilla.suse.com/1104365" }, { "category": "self", "summary": "SUSE Bug 1104494", "url": "https://bugzilla.suse.com/1104494" }, { "category": "self", "summary": "SUSE Bug 1104495", "url": "https://bugzilla.suse.com/1104495" }, { "category": "self", "summary": "SUSE Bug 1104897", "url": "https://bugzilla.suse.com/1104897" }, { "category": "self", "summary": "SUSE Bug 1105292", "url": "https://bugzilla.suse.com/1105292" }, { "category": "self", "summary": "SUSE Bug 970506", "url": "https://bugzilla.suse.com/970506" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18344 page", "url": "https://www.suse.com/security/cve/CVE-2017-18344/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10876 page", "url": "https://www.suse.com/security/cve/CVE-2018-10876/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10877 page", "url": "https://www.suse.com/security/cve/CVE-2018-10877/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10878 page", "url": "https://www.suse.com/security/cve/CVE-2018-10878/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10879 page", "url": "https://www.suse.com/security/cve/CVE-2018-10879/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10880 page", "url": "https://www.suse.com/security/cve/CVE-2018-10880/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10881 page", "url": "https://www.suse.com/security/cve/CVE-2018-10881/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10882 page", "url": "https://www.suse.com/security/cve/CVE-2018-10882/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10883 page", "url": "https://www.suse.com/security/cve/CVE-2018-10883/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14734 page", "url": "https://www.suse.com/security/cve/CVE-2018-14734/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3620 page", "url": "https://www.suse.com/security/cve/CVE-2018-3620/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5391 page", "url": "https://www.suse.com/security/cve/CVE-2018-5391/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-9363 page", "url": "https://www.suse.com/security/cve/CVE-2018-9363/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-09-03T15:29:13Z", "generator": { "date": "2018-09-03T15:29:13Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2596-1", "initial_release_date": "2018-09-03T15:29:13Z", "revision_history": [ { "date": "2018-09-03T15:29:13Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-4.4.147-3.20.1.noarch", "product": { "name": "kernel-devel-rt-4.4.147-3.20.1.noarch", "product_id": "kernel-devel-rt-4.4.147-3.20.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-4.4.147-3.20.1.noarch", "product": { "name": "kernel-source-rt-4.4.147-3.20.1.noarch", "product_id": "kernel-source-rt-4.4.147-3.20.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "product": { "name": "cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "product_id": "cluster-md-kmp-rt-4.4.147-3.20.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-4.4.147-3.20.1.x86_64", "product": { "name": "dlm-kmp-rt-4.4.147-3.20.1.x86_64", "product_id": "dlm-kmp-rt-4.4.147-3.20.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "product": { "name": "gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "product_id": "gfs2-kmp-rt-4.4.147-3.20.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-4.4.147-3.20.1.x86_64", "product": { "name": "kernel-rt-4.4.147-3.20.1.x86_64", "product_id": "kernel-rt-4.4.147-3.20.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-4.4.147-3.20.1.x86_64", "product": { "name": "kernel-rt-base-4.4.147-3.20.1.x86_64", "product_id": "kernel-rt-base-4.4.147-3.20.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-4.4.147-3.20.1.x86_64", "product": { "name": "kernel-rt-devel-4.4.147-3.20.1.x86_64", "product_id": "kernel-rt-devel-4.4.147-3.20.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "product": { "name": "kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "product_id": "kernel-rt_debug-devel-4.4.147-3.20.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-4.4.147-3.20.1.x86_64", "product": { "name": "kernel-syms-rt-4.4.147-3.20.1.x86_64", "product_id": "kernel-syms-rt-4.4.147-3.20.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", "product": { "name": "ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", "product_id": "ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 12 SP3", "product": { "name": "SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-4.4.147-3.20.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-4.4.147-3.20.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64" }, "product_reference": "dlm-kmp-rt-4.4.147-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-4.4.147-3.20.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64" }, "product_reference": "gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-4.4.147-3.20.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch" }, "product_reference": "kernel-devel-rt-4.4.147-3.20.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-4.4.147-3.20.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64" }, "product_reference": "kernel-rt-4.4.147-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-4.4.147-3.20.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64" }, "product_reference": "kernel-rt-base-4.4.147-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-4.4.147-3.20.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64" }, "product_reference": "kernel-rt-devel-4.4.147-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-4.4.147-3.20.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-4.4.147-3.20.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch" }, "product_reference": "kernel-source-rt-4.4.147-3.20.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-4.4.147-3.20.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64" }, "product_reference": "kernel-syms-rt-4.4.147-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-4.4.147-3.20.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-4.4.147-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-18344", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18344" } ], "notes": [ { "category": "general", "text": "The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18344", "url": "https://www.suse.com/security/cve/CVE-2017-18344" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102851 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1102851" }, { "category": "external", "summary": "SUSE Bug 1103203 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103203" }, { "category": "external", "summary": "SUSE Bug 1103580 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103580" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-03T15:29:13Z", "details": "moderate" } ], "title": "CVE-2017-18344" }, { "cve": "CVE-2018-10876", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10876" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10876", "url": "https://www.suse.com/security/cve/CVE-2018-10876" }, { "category": "external", "summary": "SUSE Bug 1099811 for CVE-2018-10876", "url": "https://bugzilla.suse.com/1099811" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-03T15:29:13Z", "details": "moderate" } ], "title": "CVE-2018-10876" }, { "cve": "CVE-2018-10877", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10877" } ], "notes": [ { "category": "general", "text": "Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10877", "url": "https://www.suse.com/security/cve/CVE-2018-10877" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10877", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099846 for CVE-2018-10877", "url": "https://bugzilla.suse.com/1099846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-03T15:29:13Z", "details": "moderate" } ], "title": "CVE-2018-10877" }, { "cve": "CVE-2018-10878", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10878" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10878", "url": "https://www.suse.com/security/cve/CVE-2018-10878" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10878", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099813 for CVE-2018-10878", "url": "https://bugzilla.suse.com/1099813" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-03T15:29:13Z", "details": "moderate" } ], "title": "CVE-2018-10878" }, { "cve": "CVE-2018-10879", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10879" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10879", "url": "https://www.suse.com/security/cve/CVE-2018-10879" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10879", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099844 for CVE-2018-10879", "url": "https://bugzilla.suse.com/1099844" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-03T15:29:13Z", "details": "moderate" } ], "title": "CVE-2018-10879" }, { "cve": "CVE-2018-10880", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10880" } ], "notes": [ { "category": "general", "text": "Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10880", "url": "https://www.suse.com/security/cve/CVE-2018-10880" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10880", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099845 for CVE-2018-10880", "url": "https://bugzilla.suse.com/1099845" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-03T15:29:13Z", "details": "moderate" } ], "title": "CVE-2018-10880" }, { "cve": "CVE-2018-10881", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10881" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10881", "url": "https://www.suse.com/security/cve/CVE-2018-10881" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10881", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099864 for CVE-2018-10881", "url": "https://bugzilla.suse.com/1099864" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-03T15:29:13Z", "details": "moderate" } ], "title": "CVE-2018-10881" }, { "cve": "CVE-2018-10882", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10882" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10882", "url": "https://www.suse.com/security/cve/CVE-2018-10882" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10882", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099849 for CVE-2018-10882", "url": "https://bugzilla.suse.com/1099849" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-03T15:29:13Z", "details": "moderate" } ], "title": "CVE-2018-10882" }, { "cve": "CVE-2018-10883", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10883" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10883", "url": "https://www.suse.com/security/cve/CVE-2018-10883" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10883", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099863 for CVE-2018-10883", "url": "https://bugzilla.suse.com/1099863" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-03T15:29:13Z", "details": "moderate" } ], "title": "CVE-2018-10883" }, { "cve": "CVE-2018-14734", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14734" } ], "notes": [ { "category": "general", "text": "drivers/infiniband/core/ucma.c in the Linux kernel through 4.17.11 allows ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14734", "url": "https://www.suse.com/security/cve/CVE-2018-14734" }, { "category": "external", "summary": "SUSE Bug 1103119 for CVE-2018-14734", "url": "https://bugzilla.suse.com/1103119" }, { "category": "external", "summary": "SUSE Bug 1131390 for CVE-2018-14734", "url": "https://bugzilla.suse.com/1131390" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-03T15:29:13Z", "details": "low" } ], "title": "CVE-2018-14734" }, { "cve": "CVE-2018-3620", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3620" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3620", "url": "https://www.suse.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1090340 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1090340" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-03T15:29:13Z", "details": "moderate" } ], "title": "CVE-2018-3620" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-03T15:29:13Z", "details": "important" } ], "title": "CVE-2018-3646" }, { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-03T15:29:13Z", "details": "moderate" } ], "title": "CVE-2018-5390" }, { "cve": "CVE-2018-5391", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5391" } ], "notes": [ { "category": "general", "text": "The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5391", "url": "https://www.suse.com/security/cve/CVE-2018-5391" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1108654 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1108654" }, { "category": "external", "summary": "SUSE Bug 1114071 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1114071" }, { "category": "external", "summary": "SUSE Bug 1121102 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1121102" }, { "category": "external", "summary": "SUSE Bug 1134140 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1134140" }, { "category": "external", "summary": "SUSE Bug 1181460 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1181460" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-03T15:29:13Z", "details": "moderate" } ], "title": "CVE-2018-5391" }, { "cve": "CVE-2018-9363", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-9363" } ], "notes": [ { "category": "general", "text": "In the hidp_process_report in bluetooth, there is an integer overflow. This could lead to an out of bounds write with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-65853588 References: Upstream kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-9363", "url": "https://www.suse.com/security/cve/CVE-2018-9363" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-9363", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1105292 for CVE-2018-9363", "url": "https://bugzilla.suse.com/1105292" }, { "category": "external", "summary": "SUSE Bug 1105293 for CVE-2018-9363", "url": "https://bugzilla.suse.com/1105293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.147-3.20.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.147-3.20.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.147-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-03T15:29:13Z", "details": "important" } ], "title": "CVE-2018-9363" } ] }
suse-su-2018:3490-1
Vulnerability from csaf_suse
Published
2018-10-26 11:09
Modified
2018-10-26 11:09
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
XEN was updated to the Xen 4.9.3 bug fix only release (bsc#1027519)
- CVE-2018-17963: qemu_deliver_packet_iov accepted packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact. (bsc#1111014)
- CVE-2018-15470: oxenstored might not have enforced the configured quota-maxentity. This allowed a malicious or buggy guest to write as many xenstore entries as it wishes, causing unbounded memory usage in oxenstored. This can lead to a system-wide DoS. (XSA-272) (bsc#1103279)
- CVE-2018-15469: ARM never properly implemented grant table v2, either in the hypervisor or in Linux. Unfortunately, an ARM guest can still request v2 grant tables; they will simply not be properly set up, resulting in subsequent grant-related hypercalls hitting BUG() checks. An unprivileged guest can cause a BUG() check in the hypervisor, resulting in a denial-of-service (crash). (XSA-268) (bsc#1103275)
Note that SUSE does not ship ARM Xen, so we are not affected.
- CVE-2018-15468: The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) can lock up the entire host, causing a Denial of Service. (XSA-269) (bsc#1103276)
- CVE-2018-3646: Systems with microprocessors utilizing speculative execution and address translations may have allowed unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis. (XSA-273) (bsc#1091107)
Non security issues fixed:
- The affinity reporting via 'xl vcpu-list' was broken (bsc#1106263)
- Kernel oops in fs/dcache.c called by d_materialise_unique() (bsc#1094508)
Patchnames
SUSE-SLE-DESKTOP-12-SP3-2018-2492,SUSE-SLE-SDK-12-SP3-2018-2492,SUSE-SLE-SERVER-12-SP3-2018-2492
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\nXEN was updated to the Xen 4.9.3 bug fix only release (bsc#1027519)\n\n- CVE-2018-17963: qemu_deliver_packet_iov accepted packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact. (bsc#1111014)\n- CVE-2018-15470: oxenstored might not have enforced the configured quota-maxentity. This allowed a malicious or buggy guest to write as many xenstore entries as it wishes, causing unbounded memory usage in oxenstored. This can lead to a system-wide DoS. (XSA-272) (bsc#1103279)\n- CVE-2018-15469: ARM never properly implemented grant table v2, either in the hypervisor or in Linux. Unfortunately, an ARM guest can still request v2 grant tables; they will simply not be properly set up, resulting in subsequent grant-related hypercalls hitting BUG() checks. An unprivileged guest can cause a BUG() check in the hypervisor, resulting in a denial-of-service (crash). (XSA-268) (bsc#1103275)\n Note that SUSE does not ship ARM Xen, so we are not affected.\n- CVE-2018-15468: The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) can lock up the entire host, causing a Denial of Service. (XSA-269) (bsc#1103276)\n- CVE-2018-3646: Systems with microprocessors utilizing speculative execution and address translations may have allowed unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis. (XSA-273) (bsc#1091107)\n\nNon security issues fixed:\n\n- The affinity reporting via \u0027xl vcpu-list\u0027 was broken (bsc#1106263)\n- Kernel oops in fs/dcache.c called by d_materialise_unique() (bsc#1094508)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP3-2018-2492,SUSE-SLE-SDK-12-SP3-2018-2492,SUSE-SLE-SERVER-12-SP3-2018-2492", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3490-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:3490-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183490-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:3490-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004800.html" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1078292", "url": "https://bugzilla.suse.com/1078292" }, { "category": "self", "summary": "SUSE Bug 1091107", "url": "https://bugzilla.suse.com/1091107" }, { "category": "self", "summary": "SUSE Bug 1094508", "url": "https://bugzilla.suse.com/1094508" }, { "category": "self", "summary": "SUSE Bug 1103275", "url": "https://bugzilla.suse.com/1103275" }, { "category": "self", "summary": "SUSE Bug 1103276", "url": "https://bugzilla.suse.com/1103276" }, { "category": "self", "summary": "SUSE Bug 1103279", "url": "https://bugzilla.suse.com/1103279" }, { "category": "self", "summary": "SUSE Bug 1106263", "url": "https://bugzilla.suse.com/1106263" }, { "category": "self", "summary": "SUSE Bug 1111014", "url": "https://bugzilla.suse.com/1111014" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15468 page", "url": "https://www.suse.com/security/cve/CVE-2018-15468/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15469 page", "url": "https://www.suse.com/security/cve/CVE-2018-15469/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15470 page", "url": "https://www.suse.com/security/cve/CVE-2018-15470/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-17963 page", "url": "https://www.suse.com/security/cve/CVE-2018-17963/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2018-10-26T11:09:27Z", "generator": { "date": "2018-10-26T11:09:27Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:3490-1", "initial_release_date": "2018-10-26T11:09:27Z", "revision_history": [ { "date": "2018-10-26T11:09:27Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-devel-4.9.3_03-3.44.2.aarch64", "product": { "name": "xen-devel-4.9.3_03-3.44.2.aarch64", "product_id": "xen-devel-4.9.3_03-3.44.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-4.9.3_03-3.44.2.x86_64", "product": { "name": "xen-4.9.3_03-3.44.2.x86_64", "product_id": "xen-4.9.3_03-3.44.2.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.9.3_03-3.44.2.x86_64", "product": { "name": "xen-libs-4.9.3_03-3.44.2.x86_64", "product_id": "xen-libs-4.9.3_03-3.44.2.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "product": { "name": "xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "product_id": "xen-libs-32bit-4.9.3_03-3.44.2.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.9.3_03-3.44.2.x86_64", "product": { "name": "xen-devel-4.9.3_03-3.44.2.x86_64", "product_id": "xen-devel-4.9.3_03-3.44.2.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.9.3_03-3.44.2.x86_64", "product": { "name": "xen-doc-html-4.9.3_03-3.44.2.x86_64", "product_id": "xen-doc-html-4.9.3_03-3.44.2.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.9.3_03-3.44.2.x86_64", "product": { "name": "xen-tools-4.9.3_03-3.44.2.x86_64", "product_id": "xen-tools-4.9.3_03-3.44.2.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.9.3_03-3.44.2.x86_64", "product": { "name": "xen-tools-domU-4.9.3_03-3.44.2.x86_64", "product_id": "xen-tools-domU-4.9.3_03-3.44.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3", "product": { "name": "SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.9.3_03-3.44.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.3_03-3.44.2.x86_64" }, "product_reference": "xen-4.9.3_03-3.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.9.3_03-3.44.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64" }, "product_reference": "xen-libs-4.9.3_03-3.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.9.3_03-3.44.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64" }, "product_reference": "xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.9.3_03-3.44.2.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.3_03-3.44.2.aarch64" }, "product_reference": "xen-devel-4.9.3_03-3.44.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.9.3_03-3.44.2.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.3_03-3.44.2.x86_64" }, "product_reference": "xen-devel-4.9.3_03-3.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.9.3_03-3.44.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:xen-4.9.3_03-3.44.2.x86_64" }, "product_reference": "xen-4.9.3_03-3.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.9.3_03-3.44.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.3_03-3.44.2.x86_64" }, "product_reference": "xen-doc-html-4.9.3_03-3.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.9.3_03-3.44.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64" }, "product_reference": "xen-libs-4.9.3_03-3.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.9.3_03-3.44.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64" }, "product_reference": "xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.9.3_03-3.44.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.3_03-3.44.2.x86_64" }, "product_reference": "xen-tools-4.9.3_03-3.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.9.3_03-3.44.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.3_03-3.44.2.x86_64" }, "product_reference": "xen-tools-domU-4.9.3_03-3.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.9.3_03-3.44.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.3_03-3.44.2.x86_64" }, "product_reference": "xen-4.9.3_03-3.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.9.3_03-3.44.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.3_03-3.44.2.x86_64" }, "product_reference": "xen-doc-html-4.9.3_03-3.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.9.3_03-3.44.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64" }, "product_reference": "xen-libs-4.9.3_03-3.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.9.3_03-3.44.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64" }, "product_reference": "xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.9.3_03-3.44.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.3_03-3.44.2.x86_64" }, "product_reference": "xen-tools-4.9.3_03-3.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.9.3_03-3.44.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.3_03-3.44.2.x86_64" }, "product_reference": "xen-tools-domU-4.9.3_03-3.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-15468", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15468" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) can lock up the entire host, causing a Denial of Service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.3_03-3.44.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.3_03-3.44.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15468", "url": "https://www.suse.com/security/cve/CVE-2018-15468" }, { "category": "external", "summary": "SUSE Bug 1103276 for CVE-2018-15468", "url": "https://bugzilla.suse.com/1103276" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.3_03-3.44.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.3_03-3.44.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.3_03-3.44.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.3_03-3.44.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-26T11:09:27Z", "details": "moderate" } ], "title": "CVE-2018-15468" }, { "cve": "CVE-2018-15469", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15469" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.11.x. ARM never properly implemented grant table v2, either in the hypervisor or in Linux. Unfortunately, an ARM guest can still request v2 grant tables; they will simply not be properly set up, resulting in subsequent grant-related hypercalls hitting BUG() checks. An unprivileged guest can cause a BUG() check in the hypervisor, resulting in a denial-of-service (crash).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.3_03-3.44.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.3_03-3.44.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15469", "url": "https://www.suse.com/security/cve/CVE-2018-15469" }, { "category": "external", "summary": "SUSE Bug 1103275 for CVE-2018-15469", "url": "https://bugzilla.suse.com/1103275" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.3_03-3.44.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.3_03-3.44.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.3_03-3.44.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.3_03-3.44.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-26T11:09:27Z", "details": "moderate" } ], "title": "CVE-2018-15469" }, { "cve": "CVE-2018-15470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15470" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.11.x. The logic in oxenstored for handling writes depended on the order of evaluation of expressions making up a tuple. As indicated in section 7.7.3 \"Operations on data structures\" of the OCaml manual, the order of evaluation of subexpressions is not specified. In practice, different implementations behave differently. Thus, oxenstored may not enforce the configured quota-maxentity. This allows a malicious or buggy guest to write as many xenstore entries as it wishes, causing unbounded memory usage in oxenstored. This can lead to a system-wide DoS.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.3_03-3.44.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.3_03-3.44.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15470", "url": "https://www.suse.com/security/cve/CVE-2018-15470" }, { "category": "external", "summary": "SUSE Bug 1103279 for CVE-2018-15470", "url": "https://bugzilla.suse.com/1103279" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.3_03-3.44.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.3_03-3.44.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.3_03-3.44.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.3_03-3.44.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-26T11:09:27Z", "details": "moderate" } ], "title": "CVE-2018-15470" }, { "cve": "CVE-2018-17963", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-17963" } ], "notes": [ { "category": "general", "text": "qemu_deliver_packet_iov in net/net.c in Qemu accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.3_03-3.44.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.3_03-3.44.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-17963", "url": "https://www.suse.com/security/cve/CVE-2018-17963" }, { "category": "external", "summary": "SUSE Bug 1111013 for CVE-2018-17963", "url": "https://bugzilla.suse.com/1111013" }, { "category": "external", "summary": "SUSE Bug 1111014 for CVE-2018-17963", "url": "https://bugzilla.suse.com/1111014" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-17963", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.3_03-3.44.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.3_03-3.44.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.3_03-3.44.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.3_03-3.44.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-26T11:09:27Z", "details": "moderate" } ], "title": "CVE-2018-17963" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.3_03-3.44.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.3_03-3.44.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.3_03-3.44.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.3_03-3.44.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.3_03-3.44.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.3_03-3.44.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.3_03-3.44.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-26T11:09:27Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2409-1
Vulnerability from csaf_suse
Published
2018-08-17 11:42
Modified
2018-08-17 11:42
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following security issues:
- CVE-2018-3646: Systems with microprocessors utilizing speculative execution
and address translations may have allowed unauthorized disclosure of
information residing in the L1 data cache to an attacker with local user access
with guest OS privilege via a terminal page fault and a side-channel analysis
(bsc#1091107, bsc#1027519).
- Incorrect MSR_DEBUGCTL handling let guests enable BTS allowing a malicious or
buggy guest administrator can lock up the entire host (bsc#1103276)
Patchnames
SUSE-SLE-Module-Basesystem-15-2018-1663,SUSE-SLE-Module-Server-Applications-15-2018-1663
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following security issues:\n\n- CVE-2018-3646: Systems with microprocessors utilizing speculative execution\n and address translations may have allowed unauthorized disclosure of\n information residing in the L1 data cache to an attacker with local user access\n with guest OS privilege via a terminal page fault and a side-channel analysis\n (bsc#1091107, bsc#1027519).\n- Incorrect MSR_DEBUGCTL handling let guests enable BTS allowing a malicious or\n buggy guest administrator can lock up the entire host (bsc#1103276)\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Basesystem-15-2018-1663,SUSE-SLE-Module-Server-Applications-15-2018-1663", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2409-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2409-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182409-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2409-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004464.html" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1091107", "url": "https://bugzilla.suse.com/1091107" }, { "category": "self", "summary": "SUSE Bug 1103276", "url": "https://bugzilla.suse.com/1103276" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2018-08-17T11:42:30Z", "generator": { "date": "2018-08-17T11:42:30Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2409-1", "initial_release_date": "2018-08-17T11:42:30Z", "revision_history": [ { "date": "2018-08-17T11:42:30Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-libs-4.10.1_08-3.6.1.x86_64", "product": { "name": "xen-libs-4.10.1_08-3.6.1.x86_64", "product_id": "xen-libs-4.10.1_08-3.6.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.10.1_08-3.6.1.x86_64", "product": { "name": "xen-tools-domU-4.10.1_08-3.6.1.x86_64", "product_id": "xen-tools-domU-4.10.1_08-3.6.1.x86_64" } }, { "category": "product_version", "name": "xen-4.10.1_08-3.6.1.x86_64", "product": { "name": "xen-4.10.1_08-3.6.1.x86_64", "product_id": "xen-4.10.1_08-3.6.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.10.1_08-3.6.1.x86_64", "product": { "name": "xen-devel-4.10.1_08-3.6.1.x86_64", "product_id": "xen-devel-4.10.1_08-3.6.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.10.1_08-3.6.1.x86_64", "product": { "name": "xen-tools-4.10.1_08-3.6.1.x86_64", "product_id": "xen-tools-4.10.1_08-3.6.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Server Applications 15", "product": { "name": "SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-server-applications:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.10.1_08-3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.1_08-3.6.1.x86_64" }, "product_reference": "xen-libs-4.10.1_08-3.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.10.1_08-3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.1_08-3.6.1.x86_64" }, "product_reference": "xen-tools-domU-4.10.1_08-3.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.10.1_08-3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.1_08-3.6.1.x86_64" }, "product_reference": "xen-4.10.1_08-3.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.10.1_08-3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.1_08-3.6.1.x86_64" }, "product_reference": "xen-devel-4.10.1_08-3.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.10.1_08-3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.1_08-3.6.1.x86_64" }, "product_reference": "xen-tools-4.10.1_08-3.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.1_08-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.1_08-3.6.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.1_08-3.6.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.1_08-3.6.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.1_08-3.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.1_08-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.1_08-3.6.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.1_08-3.6.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.1_08-3.6.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.1_08-3.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.1_08-3.6.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.1_08-3.6.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.1_08-3.6.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.1_08-3.6.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.1_08-3.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-17T11:42:30Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2963-1
Vulnerability from csaf_suse
Published
2018-10-01 16:05
Modified
2018-10-01 16:05
Summary
Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP3)
Description of the patch
This update for the Linux Kernel 4.4.140-94_42 fixes several issues.
The following security issues were fixed:
- CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682).
- CVE-2018-10938: Fixed an infinite loop in the cipso_v4_optptr() function leading to a denial-of-service via crafted network packets (bsc#1106191).
- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323).
- CVE-2018-3646: Fixed unauthorized disclosure of information residing in the L1 data cache on systems with microprocessors utilizing speculative execution and address translations (bsc#1099306).
Patchnames
SUSE-SLE-Live-Patching-12-SP3-2018-2108,SUSE-SLE-Live-Patching-12-SP3-2018-2109
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.140-94_42 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682).\n- CVE-2018-10938: Fixed an infinite loop in the cipso_v4_optptr() function leading to a denial-of-service via crafted network packets (bsc#1106191).\n- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323).\n- CVE-2018-3646: Fixed unauthorized disclosure of information residing in the L1 data cache on systems with microprocessors utilizing speculative execution and address translations (bsc#1099306).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-2108,SUSE-SLE-Live-Patching-12-SP3-2018-2109", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2963-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2963-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182963-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2963-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182963-1.html" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE Bug 1102682", "url": "https://bugzilla.suse.com/1102682" }, { "category": "self", "summary": "SUSE Bug 1103203", "url": "https://bugzilla.suse.com/1103203" }, { "category": "self", "summary": "SUSE Bug 1105323", "url": "https://bugzilla.suse.com/1105323" }, { "category": "self", "summary": "SUSE Bug 1106191", "url": "https://bugzilla.suse.com/1106191" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10902 page", "url": "https://www.suse.com/security/cve/CVE-2018-10902/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10938 page", "url": "https://www.suse.com/security/cve/CVE-2018-10938/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" } ], "title": "Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-10-01T16:05:21Z", "generator": { "date": "2018-10-01T16:05:21Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2963-1", "initial_release_date": "2018-10-01T16:05:21Z", "revision_history": [ { "date": "2018-10-01T16:05:21Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le", "product_id": "kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le", "product_id": "kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64", "product_id": "kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64", "product_id": "kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10902" } ], "notes": [ { "category": "general", "text": "It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10902", "url": "https://www.suse.com/security/cve/CVE-2018-10902" }, { "category": "external", "summary": "SUSE Bug 1105322 for CVE-2018-10902", "url": "https://bugzilla.suse.com/1105322" }, { "category": "external", "summary": "SUSE Bug 1105323 for CVE-2018-10902", "url": "https://bugzilla.suse.com/1105323" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-01T16:05:21Z", "details": "low" } ], "title": "CVE-2018-10902" }, { "cve": "CVE-2018-10938", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10938" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel present since v4.0-rc1 and through v4.13-rc4. A crafted network packet sent remotely by an attacker may force the kernel to enter an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c leading to a denial-of-service. A certain non-default configuration of LSM (Linux Security Module) and NetLabel should be set up on a system before an attacker could leverage this flaw.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10938", "url": "https://www.suse.com/security/cve/CVE-2018-10938" }, { "category": "external", "summary": "SUSE Bug 1106016 for CVE-2018-10938", "url": "https://bugzilla.suse.com/1106016" }, { "category": "external", "summary": "SUSE Bug 1106191 for CVE-2018-10938", "url": "https://bugzilla.suse.com/1106191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-01T16:05:21Z", "details": "moderate" } ], "title": "CVE-2018-10938" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-01T16:05:21Z", "details": "important" } ], "title": "CVE-2018-3646" }, { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-01T16:05:21Z", "details": "moderate" } ], "title": "CVE-2018-5390" } ] }
suse-su-2018:2362-1
Vulnerability from csaf_suse
Published
2018-08-16 07:08
Modified
2018-08-16 07:08
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 GA LTSS kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).
- CVE-2018-13405: The inode_init_owner function in fs/inode.c allowed local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID (bnc#1100416).
- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 bnc#1100418).
- CVE-2018-14734: drivers/infiniband/core/ucma.c allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).
- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).
The following non-security bugs were fixed:
- bcache: Add __printf annotation to __bch_check_keys() (bsc#1064232).
- bcache: Annotate switch fall-through (bsc#1064232).
- bcache: Fix a compiler warning in bcache_device_init() (bsc#1064232).
- bcache: Fix indentation (bsc#1064232).
- bcache: Fix kernel-doc warnings (bsc#1064232).
- bcache: Fix, improve efficiency of closure_sync() (bsc#1064232).
- bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1064232).
- bcache: Remove an unused variable (bsc#1064232).
- bcache: Suppress more warnings about set-but-not-used variables (bsc#1064232).
- bcache: Use PTR_ERR_OR_ZERO() (bsc#1064232).
- bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1064232).
- bcache: add backing_request_endio() for bi_end_io (bsc#1064232).
- bcache: add io_disable to struct cached_dev (bsc#1064232).
- bcache: add journal statistic (bsc#1064232).
- bcache: add stop_when_cache_set_failed option to backing device (bsc#1064232).
- bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1064232).
- bcache: closures: move control bits one bit right (bsc#1064232).
- bcache: correct flash only vols (check all uuids) (bsc#1064232).
- bcache: count backing device I/O error for writeback I/O (bsc#1064232).
- bcache: do not attach backing with duplicate UUID (bsc#1064232).
- bcache: fix cached_dev->count usage for bch_cache_set_error() (bsc#1064232).
- bcache: fix crashes in duplicate cache device register (bsc#1064232).
- bcache: fix error return value in memory shrink (bsc#1064232).
- bcache: fix for allocator and register thread race (bsc#1064232).
- bcache: fix for data collapse after re-attaching an attached device (bsc#1064232).
- bcache: fix high CPU occupancy during journal (bsc#1064232).
- bcache: fix incorrect sysfs output value of strip size (bsc#1064232).
- bcache: fix kcrashes with fio in RAID5 backend dev (bsc#1064232).
- bcache: fix misleading error message in bch_count_io_errors() (bsc#1064232).
- bcache: fix using of loop variable in memory shrink (bsc#1064232).
- bcache: fix writeback target calc on large devices (bsc#1064232).
- bcache: fix wrong return value in bch_debug_init() (bsc#1064232).
- bcache: mark closure_sync() __sched (bsc#1064232).
- bcache: move closure debug file into debug directory (bsc#1064232).
- bcache: properly set task state in bch_writeback_thread() (bsc#1064232).
- bcache: quit dc->writeback_thread when BCACHE_DEV_DETACHING is set (bsc#1064232).
- bcache: reduce cache_set devices iteration by devices_max_used (bsc#1064232).
- bcache: ret IOERR when read meets metadata error (bsc#1064232).
- bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1064232).
- bcache: return attach error when no cache set exist (bsc#1064232).
- bcache: segregate flash only volume write streams (bsc#1064232).
- bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1064232).
- bcache: set dc->io_disable to true in conditional_stop_bcache_device() (bsc#1064232).
- bcache: set error_limit correctly (bsc#1064232).
- bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1064232).
- bcache: stop bcache device when backing device is offline (bsc#1064232).
- bcache: stop dc->writeback_rate_update properly (bsc#1064232).
- bcache: stop writeback thread after detaching (bsc#1064232).
- bcache: store disk name in struct cache and struct cached_dev (bsc#1064232).
- bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1064232).
- cpu/hotplug: Add sysfs state interface (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).
- x86/Xen: disable IBRS around CPU stopper function invocation (none so far).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] (bnc#1012382).
- x86/mm: Simplify p[g4um]xen: d_page() macros (bnc#1087081).
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).
- x86/topology: Add topology_max_smt_threads() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- xen/x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- xen/x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- xen/x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- xen/x86/cpufeatures: Add X86_BUG_CPU_INSECURE (bnc#1012382).
- xen/x86/cpufeatures: Make CPU bugs sticky (bnc#1012382).
- xen/x86/entry: Add a function to overwrite the RSB (bsc#1068032).
- xen/x86/entry: Stuff RSB for entry to kernel for non-SMEP platform (bsc#1068032).
- xen/x86/entry: Use IBRS on entry to kernel space (bsc#1068032).
- xen/x86/mm: Set IBPB upon context switch (bsc#1068032).
- xen/x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN (bnc#1012382).
Patchnames
SUSE-SLE-Module-Public-Cloud-12-2018-1605,SUSE-SLE-SERVER-12-2018-1605
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 GA LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).\n- CVE-2018-13405: The inode_init_owner function in fs/inode.c allowed local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID (bnc#1100416).\n- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 bnc#1100418).\n- CVE-2018-14734: drivers/infiniband/core/ucma.c allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).\n- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).\n\nThe following non-security bugs were fixed:\n\n- bcache: Add __printf annotation to __bch_check_keys() (bsc#1064232).\n- bcache: Annotate switch fall-through (bsc#1064232).\n- bcache: Fix a compiler warning in bcache_device_init() (bsc#1064232).\n- bcache: Fix indentation (bsc#1064232).\n- bcache: Fix kernel-doc warnings (bsc#1064232).\n- bcache: Fix, improve efficiency of closure_sync() (bsc#1064232).\n- bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1064232).\n- bcache: Remove an unused variable (bsc#1064232).\n- bcache: Suppress more warnings about set-but-not-used variables (bsc#1064232).\n- bcache: Use PTR_ERR_OR_ZERO() (bsc#1064232).\n- bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1064232).\n- bcache: add backing_request_endio() for bi_end_io (bsc#1064232).\n- bcache: add io_disable to struct cached_dev (bsc#1064232).\n- bcache: add journal statistic (bsc#1064232).\n- bcache: add stop_when_cache_set_failed option to backing device (bsc#1064232).\n- bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1064232).\n- bcache: closures: move control bits one bit right (bsc#1064232).\n- bcache: correct flash only vols (check all uuids) (bsc#1064232).\n- bcache: count backing device I/O error for writeback I/O (bsc#1064232).\n- bcache: do not attach backing with duplicate UUID (bsc#1064232).\n- bcache: fix cached_dev-\u003ecount usage for bch_cache_set_error() (bsc#1064232).\n- bcache: fix crashes in duplicate cache device register (bsc#1064232).\n- bcache: fix error return value in memory shrink (bsc#1064232).\n- bcache: fix for allocator and register thread race (bsc#1064232).\n- bcache: fix for data collapse after re-attaching an attached device (bsc#1064232).\n- bcache: fix high CPU occupancy during journal (bsc#1064232).\n- bcache: fix incorrect sysfs output value of strip size (bsc#1064232).\n- bcache: fix kcrashes with fio in RAID5 backend dev (bsc#1064232).\n- bcache: fix misleading error message in bch_count_io_errors() (bsc#1064232).\n- bcache: fix using of loop variable in memory shrink (bsc#1064232).\n- bcache: fix writeback target calc on large devices (bsc#1064232).\n- bcache: fix wrong return value in bch_debug_init() (bsc#1064232).\n- bcache: mark closure_sync() __sched (bsc#1064232).\n- bcache: move closure debug file into debug directory (bsc#1064232).\n- bcache: properly set task state in bch_writeback_thread() (bsc#1064232).\n- bcache: quit dc-\u003ewriteback_thread when BCACHE_DEV_DETACHING is set (bsc#1064232).\n- bcache: reduce cache_set devices iteration by devices_max_used (bsc#1064232).\n- bcache: ret IOERR when read meets metadata error (bsc#1064232).\n- bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1064232).\n- bcache: return attach error when no cache set exist (bsc#1064232).\n- bcache: segregate flash only volume write streams (bsc#1064232).\n- bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1064232).\n- bcache: set dc-\u003eio_disable to true in conditional_stop_bcache_device() (bsc#1064232).\n- bcache: set error_limit correctly (bsc#1064232).\n- bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1064232).\n- bcache: stop bcache device when backing device is offline (bsc#1064232).\n- bcache: stop dc-\u003ewriteback_rate_update properly (bsc#1064232).\n- bcache: stop writeback thread after detaching (bsc#1064232).\n- bcache: store disk name in struct cache and struct cached_dev (bsc#1064232).\n- bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1064232).\n- cpu/hotplug: Add sysfs state interface (bsc#1089343).\n- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).\n- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).\n- cpu/hotplug: Split do_cpu_down() (bsc#1089343).\n- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).\n- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).\n- x86/Xen: disable IBRS around CPU stopper function invocation (none so far).\n- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).\n- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] (bnc#1012382).\n- x86/mm: Simplify p[g4um]xen: d_page() macros (bnc#1087081).\n- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).\n- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).\n- x86/topology: Add topology_max_smt_threads() (bsc#1089343).\n- x86/topology: Provide topology_smt_supported() (bsc#1089343).\n- xen/x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- xen/x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- xen/x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- xen/x86/cpufeatures: Add X86_BUG_CPU_INSECURE (bnc#1012382).\n- xen/x86/cpufeatures: Make CPU bugs sticky (bnc#1012382).\n- xen/x86/entry: Add a function to overwrite the RSB (bsc#1068032).\n- xen/x86/entry: Stuff RSB for entry to kernel for non-SMEP platform (bsc#1068032).\n- xen/x86/entry: Use IBRS on entry to kernel space (bsc#1068032).\n- xen/x86/mm: Set IBPB upon context switch (bsc#1068032).\n- xen/x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN (bnc#1012382).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Public-Cloud-12-2018-1605,SUSE-SLE-SERVER-12-2018-1605", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2362-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2362-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182362-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2362-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004442.html" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1064232", "url": "https://bugzilla.suse.com/1064232" }, { "category": "self", "summary": "SUSE Bug 1068032", "url": "https://bugzilla.suse.com/1068032" }, { "category": "self", "summary": "SUSE Bug 1087081", "url": "https://bugzilla.suse.com/1087081" }, { "category": "self", "summary": "SUSE Bug 1089343", "url": "https://bugzilla.suse.com/1089343" }, { "category": "self", "summary": "SUSE Bug 1098016", "url": "https://bugzilla.suse.com/1098016" }, { "category": "self", "summary": "SUSE Bug 1099924", "url": "https://bugzilla.suse.com/1099924" }, { "category": "self", "summary": "SUSE Bug 1100416", "url": "https://bugzilla.suse.com/1100416" }, { "category": "self", "summary": "SUSE Bug 1100418", "url": "https://bugzilla.suse.com/1100418" }, { "category": "self", "summary": "SUSE Bug 1103119", "url": "https://bugzilla.suse.com/1103119" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13053 page", "url": "https://www.suse.com/security/cve/CVE-2018-13053/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13405 page", "url": "https://www.suse.com/security/cve/CVE-2018-13405/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13406 page", "url": "https://www.suse.com/security/cve/CVE-2018-13406/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14734 page", "url": "https://www.suse.com/security/cve/CVE-2018-14734/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3620 page", "url": "https://www.suse.com/security/cve/CVE-2018-3620/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-08-16T07:08:37Z", "generator": { "date": "2018-08-16T07:08:37Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2362-1", "initial_release_date": "2018-08-16T07:08:37Z", "revision_history": [ { "date": "2018-08-16T07:08:37Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.61-52.141.1.noarch", "product": { "name": "kernel-devel-3.12.61-52.141.1.noarch", "product_id": "kernel-devel-3.12.61-52.141.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.61-52.141.1.noarch", "product": { "name": "kernel-macros-3.12.61-52.141.1.noarch", "product_id": "kernel-macros-3.12.61-52.141.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.61-52.141.1.noarch", "product": { "name": "kernel-source-3.12.61-52.141.1.noarch", "product_id": "kernel-source-3.12.61-52.141.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.61-52.141.1.ppc64le", "product": { "name": "kernel-default-3.12.61-52.141.1.ppc64le", "product_id": "kernel-default-3.12.61-52.141.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.61-52.141.1.ppc64le", "product": { "name": "kernel-default-base-3.12.61-52.141.1.ppc64le", "product_id": "kernel-default-base-3.12.61-52.141.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.61-52.141.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.61-52.141.1.ppc64le", "product_id": "kernel-default-devel-3.12.61-52.141.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.61-52.141.1.ppc64le", "product": { "name": "kernel-syms-3.12.61-52.141.1.ppc64le", "product_id": "kernel-syms-3.12.61-52.141.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.61-52.141.1.s390x", "product": { "name": "kernel-default-3.12.61-52.141.1.s390x", "product_id": "kernel-default-3.12.61-52.141.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.61-52.141.1.s390x", "product": { "name": "kernel-default-base-3.12.61-52.141.1.s390x", "product_id": "kernel-default-base-3.12.61-52.141.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.61-52.141.1.s390x", "product": { "name": "kernel-default-devel-3.12.61-52.141.1.s390x", "product_id": "kernel-default-devel-3.12.61-52.141.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.61-52.141.1.s390x", "product": { "name": "kernel-default-man-3.12.61-52.141.1.s390x", "product_id": "kernel-default-man-3.12.61-52.141.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.61-52.141.1.s390x", "product": { "name": "kernel-syms-3.12.61-52.141.1.s390x", "product_id": "kernel-syms-3.12.61-52.141.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-ec2-3.12.61-52.141.1.x86_64", "product": { "name": "kernel-ec2-3.12.61-52.141.1.x86_64", "product_id": "kernel-ec2-3.12.61-52.141.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.61-52.141.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.61-52.141.1.x86_64", "product_id": "kernel-ec2-devel-3.12.61-52.141.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.61-52.141.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.61-52.141.1.x86_64", "product_id": "kernel-ec2-extra-3.12.61-52.141.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.12.61-52.141.1.x86_64", "product": { "name": "kernel-default-3.12.61-52.141.1.x86_64", "product_id": "kernel-default-3.12.61-52.141.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.61-52.141.1.x86_64", "product": { "name": "kernel-default-base-3.12.61-52.141.1.x86_64", "product_id": "kernel-default-base-3.12.61-52.141.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.61-52.141.1.x86_64", "product": { "name": "kernel-default-devel-3.12.61-52.141.1.x86_64", "product_id": "kernel-default-devel-3.12.61-52.141.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.61-52.141.1.x86_64", "product": { "name": "kernel-syms-3.12.61-52.141.1.x86_64", "product_id": "kernel-syms-3.12.61-52.141.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.61-52.141.1.x86_64", "product": { "name": "kernel-xen-3.12.61-52.141.1.x86_64", "product_id": "kernel-xen-3.12.61-52.141.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.61-52.141.1.x86_64", "product": { "name": "kernel-xen-base-3.12.61-52.141.1.x86_64", "product_id": "kernel-xen-base-3.12.61-52.141.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.61-52.141.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.61-52.141.1.x86_64", "product_id": "kernel-xen-devel-3.12.61-52.141.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64" } }, { "category": "product_version", "name": "lttng-modules-2.4.1-16.6.1.x86_64", "product": { "name": "lttng-modules-2.4.1-16.6.1.x86_64", "product_id": "lttng-modules-2.4.1-16.6.1.x86_64" } }, { "category": "product_version", "name": "lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64", "product": { "name": "lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64", "product_id": "lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.61-52.141.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64" }, "product_reference": "kernel-ec2-3.12.61-52.141.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.61-52.141.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.61-52.141.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.61-52.141.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.61-52.141.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.141.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le" }, "product_reference": "kernel-default-3.12.61-52.141.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.141.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x" }, "product_reference": "kernel-default-3.12.61-52.141.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.141.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64" }, "product_reference": "kernel-default-3.12.61-52.141.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.141.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.61-52.141.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.141.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x" }, "product_reference": "kernel-default-base-3.12.61-52.141.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.141.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64" }, "product_reference": "kernel-default-base-3.12.61-52.141.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.141.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.61-52.141.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.141.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x" }, "product_reference": "kernel-default-devel-3.12.61-52.141.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.141.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.61-52.141.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.61-52.141.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x" }, "product_reference": "kernel-default-man-3.12.61-52.141.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.61-52.141.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch" }, "product_reference": "kernel-devel-3.12.61-52.141.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.61-52.141.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch" }, "product_reference": "kernel-macros-3.12.61-52.141.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.61-52.141.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch" }, "product_reference": "kernel-source-3.12.61-52.141.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.141.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le" }, "product_reference": "kernel-syms-3.12.61-52.141.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.141.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x" }, "product_reference": "kernel-syms-3.12.61-52.141.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.141.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64" }, "product_reference": "kernel-syms-3.12.61-52.141.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.61-52.141.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64" }, "product_reference": "kernel-xen-3.12.61-52.141.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.61-52.141.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.61-52.141.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.61-52.141.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.61-52.141.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-2.4.1-16.6.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64" }, "product_reference": "lttng-modules-2.4.1-16.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64" }, "product_reference": "lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-13053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13053" } ], "notes": [ { "category": "general", "text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13053", "url": "https://www.suse.com/security/cve/CVE-2018-13053" }, { "category": "external", "summary": "SUSE Bug 1099924 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1099924" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:08:37Z", "details": "low" } ], "title": "CVE-2018-13053" }, { "cve": "CVE-2018-13405", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13405" } ], "notes": [ { "category": "general", "text": "The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13405", "url": "https://www.suse.com/security/cve/CVE-2018-13405" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1100416 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1100416" }, { "category": "external", "summary": "SUSE Bug 1129735 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1129735" }, { "category": "external", "summary": "SUSE Bug 1195161 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1195161" }, { "category": "external", "summary": "SUSE Bug 1198702 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1198702" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:08:37Z", "details": "moderate" } ], "title": "CVE-2018-13405" }, { "cve": "CVE-2018-13406", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13406" } ], "notes": [ { "category": "general", "text": "An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c in the Linux kernel before 4.17.4 could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13406", "url": "https://www.suse.com/security/cve/CVE-2018-13406" }, { "category": "external", "summary": "SUSE Bug 1098016 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1098016" }, { "category": "external", "summary": "SUSE Bug 1100418 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1100418" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:08:37Z", "details": "moderate" } ], "title": "CVE-2018-13406" }, { "cve": "CVE-2018-14734", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14734" } ], "notes": [ { "category": "general", "text": "drivers/infiniband/core/ucma.c in the Linux kernel through 4.17.11 allows ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14734", "url": "https://www.suse.com/security/cve/CVE-2018-14734" }, { "category": "external", "summary": "SUSE Bug 1103119 for CVE-2018-14734", "url": "https://bugzilla.suse.com/1103119" }, { "category": "external", "summary": "SUSE Bug 1131390 for CVE-2018-14734", "url": "https://bugzilla.suse.com/1131390" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:08:37Z", "details": "low" } ], "title": "CVE-2018-14734" }, { "cve": "CVE-2018-3620", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3620" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3620", "url": "https://www.suse.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1090340 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1090340" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:08:37Z", "details": "moderate" } ], "title": "CVE-2018-3620" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.141.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.141.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-1-1.5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-2.4.1-16.6.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:lttng-modules-kmp-default-2.4.1_k3.12.61_52.141-16.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:08:37Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2483-1
Vulnerability from csaf_suse
Published
2018-08-23 12:15
Modified
2018-08-23 12:15
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
This security issue was fixed:
- CVE-2018-3646: Systems with microprocessors utilizing speculative execution
and address translations may have allowed unauthorized disclosure of
information residing in the L1 data cache to an attacker with local user access
with guest OS privilege via a terminal page fault and a side-channel analysis
(bsc#1091107, bsc#1027519).
These non-security issue were fixed:
- bsc#1102116: SSBD is not virtualized for guests
- bsc#1101684: Not able to disable the visibility of the new CPU flags
Patchnames
SUSE-SLE-SERVER-12-2018-1746
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\nThis security issue was fixed:\n\n- CVE-2018-3646: Systems with microprocessors utilizing speculative execution\n and address translations may have allowed unauthorized disclosure of\n information residing in the L1 data cache to an attacker with local user access\n with guest OS privilege via a terminal page fault and a side-channel analysis\n (bsc#1091107, bsc#1027519).\n\nThese non-security issue were fixed:\n\n- bsc#1102116: SSBD is not virtualized for guests\n- bsc#1101684: Not able to disable the visibility of the new CPU flags\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-1746", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2483-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2483-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182483-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2483-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004493.html" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1091107", "url": "https://bugzilla.suse.com/1091107" }, { "category": "self", "summary": "SUSE Bug 1101684", "url": "https://bugzilla.suse.com/1101684" }, { "category": "self", "summary": "SUSE Bug 1102116", "url": "https://bugzilla.suse.com/1102116" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2018-08-23T12:15:49Z", "generator": { "date": "2018-08-23T12:15:49Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2483-1", "initial_release_date": "2018-08-23T12:15:49Z", "revision_history": [ { "date": "2018-08-23T12:15:49Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.4.4_36-22.74.1.x86_64", "product": { "name": "xen-4.4.4_36-22.74.1.x86_64", "product_id": "xen-4.4.4_36-22.74.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.4.4_36-22.74.1.x86_64", "product": { "name": "xen-doc-html-4.4.4_36-22.74.1.x86_64", "product_id": "xen-doc-html-4.4.4_36-22.74.1.x86_64" } }, { "category": "product_version", "name": "xen-kmp-default-4.4.4_36_k3.12.61_52.141-22.74.1.x86_64", "product": { "name": "xen-kmp-default-4.4.4_36_k3.12.61_52.141-22.74.1.x86_64", "product_id": "xen-kmp-default-4.4.4_36_k3.12.61_52.141-22.74.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.4.4_36-22.74.1.x86_64", "product": { "name": "xen-libs-4.4.4_36-22.74.1.x86_64", "product_id": "xen-libs-4.4.4_36-22.74.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.4.4_36-22.74.1.x86_64", "product": { "name": "xen-libs-32bit-4.4.4_36-22.74.1.x86_64", "product_id": "xen-libs-32bit-4.4.4_36-22.74.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.4.4_36-22.74.1.x86_64", "product": { "name": "xen-tools-4.4.4_36-22.74.1.x86_64", "product_id": "xen-tools-4.4.4_36-22.74.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.4.4_36-22.74.1.x86_64", "product": { "name": "xen-tools-domU-4.4.4_36-22.74.1.x86_64", "product_id": "xen-tools-domU-4.4.4_36-22.74.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.4.4_36-22.74.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_36-22.74.1.x86_64" }, "product_reference": "xen-4.4.4_36-22.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.4.4_36-22.74.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_36-22.74.1.x86_64" }, "product_reference": "xen-doc-html-4.4.4_36-22.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.4.4_36_k3.12.61_52.141-22.74.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_36_k3.12.61_52.141-22.74.1.x86_64" }, "product_reference": "xen-kmp-default-4.4.4_36_k3.12.61_52.141-22.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.4.4_36-22.74.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_36-22.74.1.x86_64" }, "product_reference": "xen-libs-4.4.4_36-22.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.4.4_36-22.74.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_36-22.74.1.x86_64" }, "product_reference": "xen-libs-32bit-4.4.4_36-22.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.4.4_36-22.74.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_36-22.74.1.x86_64" }, "product_reference": "xen-tools-4.4.4_36-22.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.4.4_36-22.74.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_36-22.74.1.x86_64" }, "product_reference": "xen-tools-domU-4.4.4_36-22.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_36-22.74.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_36-22.74.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_36_k3.12.61_52.141-22.74.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_36-22.74.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_36-22.74.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_36-22.74.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_36-22.74.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_36-22.74.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_36-22.74.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_36_k3.12.61_52.141-22.74.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_36-22.74.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_36-22.74.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_36-22.74.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_36-22.74.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_36-22.74.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_36-22.74.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_36_k3.12.61_52.141-22.74.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_36-22.74.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_36-22.74.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_36-22.74.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_36-22.74.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-23T12:15:49Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2351-1
Vulnerability from csaf_suse
Published
2018-08-16 06:06
Modified
2018-08-16 06:06
Summary
Security update for the Linux Kernel (Live Patch 28 for SLE 12)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 28 for SLE 12)
Description of the patch
This update for the Linux Kernel 3.12.61-52_101 fixes several issues.
The following security issues were fixed:
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2017-11600: net/xfrm/xfrm_policy.c did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bsc#1096564)
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
Patchnames
SUSE-SLE-SERVER-12-2018-1590
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 28 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_101 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).\n- CVE-2017-11600: net/xfrm/xfrm_policy.c did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bsc#1096564) \n- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn\u0027t propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-1590", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2351-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2351-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182351-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2351-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004434.html" }, { "category": "self", "summary": "SUSE Bug 1096564", "url": "https://bugzilla.suse.com/1096564" }, { "category": "self", "summary": "SUSE Bug 1097108", "url": "https://bugzilla.suse.com/1097108" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE CVE CVE-2017-11600 page", "url": "https://www.suse.com/security/cve/CVE-2017-11600/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for the Linux Kernel (Live Patch 28 for SLE 12)", "tracking": { "current_release_date": "2018-08-16T06:06:05Z", "generator": { "date": "2018-08-16T06:06:05Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2351-1", "initial_release_date": "2018-08-16T06:06:05Z", "revision_history": [ { "date": "2018-08-16T06:06:05Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_101-default-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_101-default-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_101-default-8-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_101-xen-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_101-xen-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_101-xen-8-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-11600", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-11600" } ], "notes": [ { "category": "general", "text": "net/xfrm/xfrm_policy.c in the Linux kernel through 4.12.3, when CONFIG_XFRM_MIGRATE is enabled, does not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allows local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-11600", "url": "https://www.suse.com/security/cve/CVE-2017-11600" }, { "category": "external", "summary": "SUSE Bug 1050231 for CVE-2017-11600", "url": "https://bugzilla.suse.com/1050231" }, { "category": "external", "summary": "SUSE Bug 1096564 for CVE-2017-11600", "url": "https://bugzilla.suse.com/1096564" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-11600", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:06:05Z", "details": "important" } ], "title": "CVE-2017-11600" }, { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:06:05Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:06:05Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2341-1
Vulnerability from csaf_suse
Published
2018-08-16 06:05
Modified
2018-08-16 06:05
Summary
Security update for the Linux Kernel (Live Patch 33 for SLE 12)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 33 for SLE 12)
Description of the patch
This update for the Linux Kernel 3.12.61-52_125 fixes several issues.
The following security issues were fixed:
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
Patchnames
SUSE-SLE-SERVER-12-2018-1583
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 33 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_125 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).\n- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn\u0027t propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-1583", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2341-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2341-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182341-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2341-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004425.html" }, { "category": "self", "summary": "SUSE Bug 1097108", "url": "https://bugzilla.suse.com/1097108" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for the Linux Kernel (Live Patch 33 for SLE 12)", "tracking": { "current_release_date": "2018-08-16T06:05:33Z", "generator": { "date": "2018-08-16T06:05:33Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2341-1", "initial_release_date": "2018-08-16T06:05:33Z", "revision_history": [ { "date": "2018-08-16T06:05:33Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_125-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_125-default-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_125-default-6-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_125-xen-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_125-xen-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_125-xen-6-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:05:33Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:05:33Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2380-1
Vulnerability from csaf_suse
Published
2018-08-16 12:30
Modified
2018-08-16 12:30
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).
- CVE-2018-5391 aka 'FragmentSmack': A flaw in the IP packet reassembly could be used by remote attackers to consume lots of CPU time (bnc#1103097).
- CVE-2018-10876: A flaw was found in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image. (bnc#1099811)
- CVE-2018-10877: The ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image. (bnc#1099846)
- CVE-2018-10878: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image. (bnc#1099813)
- CVE-2018-10879: A flaw was found in the ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image. (bnc#1099844)
- CVE-2018-10880: Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service. (bnc#1099845)
- CVE-2018-10881: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099864)
- CVE-2018-10882: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image. (bnc#1099849)
- CVE-2018-10883: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099863)
The following non-security bugs were fixed:
- acpi / lpss: Only call pwm_add_table() for Bay Trail PWM if PMIC HRV is 2 (bsc#1051510).
- af_key: Always verify length of provided sadb_key (bsc#1051510).
- af_key: fix buffer overread in parse_exthdrs() (bsc#1051510).
- af_key: fix buffer overread in verify_address_len() (bsc#1051510).
- afs: Fix directory permissions check (bsc#1101828).
- agp: uninorth: make two functions static (bsc#1051510).
- alsa: emu10k1: add error handling for snd_ctl_add (bsc#1051510).
- alsa: emu10k1: Rate-limit error messages about page errors (bsc#1051510).
- alsa: fm801: add error handling for snd_ctl_add (bsc#1051510).
- alsa: usb-audio: Apply rate limit to warning messages in URB complete callback (bsc#1051510).
- arm64: Correct type for PUD macros (bsc#1103723).
- arm64: Disable unhandled signal log messages by default (bsc#1103724).
- arm64: kvm: fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1103725).
- arm64: mm: Fix set_memory_valid() declaration (bsc#1103726).
- arm64: perf: correct PMUVer probing (bsc#1103727).
- arm64: ptrace: Avoid setting compat FPR to garbage if get_user fails (bsc#1103728).
- arm64: spinlock: Fix theoretical trylock() A-B-A with LSE atomics (bsc#1103729).
- arm64: vdso: fix clock_getres for 4GiB-aligned res (bsc#1103730).
- arm: 8715/1: add a private asm/unaligned.h (bsc#1051510).
- arm: 8720/1: ensure dump_instr() checks addr_limit (bsc#1051510).
- arm: 8721/1: mm: dump: check hardware RO bit for LPAE (bsc#1051510).
- arm: 8722/1: mm: make STRICT_KERNEL_RWX effective for LPAE (bsc#1051510).
- arm: 8731/1: Fix csum_partial_copy_from_user() stack mismatch (bsc#1051510).
- arm: 8743/1: bL_switcher: add MODULE_LICENSE tag (bsc#1051510).
- arm: 8746/1: vfp: Go back to clearing vfp_current_hw_state[] (bsc#1051510).
- arm: 8748/1: mm: Define vdso_start, vdso_end as array (bsc#1051510).
- arm: 8753/1: decompressor: add a missing parameter to the addruart macro (bsc#1051510).
- arm: 8758/1: decompressor: restore r1 and r2 just before jumping to the kernel (bsc#1051510).
- arm: 8764/1: kgdb: fix NUMREGBYTES so that gdb_regs[] is the correct size (bsc#1051510).
- arm: 8769/1: kprobes: Fix to use get_kprobe_ctlblk after irq-disabed (bsc#1051510).
- arm: 8770/1: kprobes: Prohibit probing on optimized_callback (bsc#1051510).
- arm: 8771/1: kprobes: Prohibit kprobes on do_undefinstr (bsc#1051510).
- arm: 8772/1: kprobes: Prohibit kprobes on get_user functions (bsc#1051510).
- arm: AM33xx: PRM: Remove am33xx_pwrdm_read_prev_pwrst function (bsc#1051510).
- arm: amba: Fix race condition with driver_override (bsc#1051510).
- arm: amba: Fix wrong indentation in driver_override_store() (bsc#1051510).
- arm: amba: Make driver_override output consistent with other buses (bsc#1051510).
- arm: at91: do not select CONFIG_ARM_CPU_SUSPEND for old platforms (bsc#1051510).
- arm: avoid faulting on qemu (bsc#1051510).
- arm: BUG if jumping to usermode address in kernel mode (bsc#1051510).
- arm-ccn: perf: Prevent module unload while PMU is in use (bsc#1051510).
- arm: davinci: Add dma_mask to dm365's eDMA device (bsc#1051510).
- arm: davinci: board-da830-evm: fix GPIO lookup for MMC/SD (bsc#1051510).
- arm: davinci: board-da850-evm: fix GPIO lookup for MMC/SD (bsc#1051510).
- arm: davinci: board-da850-evm: fix WP pin polarity for MMC/SD (bsc#1051510).
- arm: davinci: board-dm355-evm: fix broken networking (bsc#1051510).
- arm: davinci: board-dm646x-evm: pass correct I2C adapter id for VPIF (bsc#1051510).
- arm: davinci: board-dm646x-evm: set VPIF capture card name (bsc#1051510).
- arm: davinci: board-omapl138-hawk: fix GPIO numbers for MMC/SD lookup (bsc#1051510).
- arm: davinci: dm646x: fix timer interrupt generation (bsc#1051510).
- arm: davinci: fix mmc entries in dm365's dma_slave_map (bsc#1051510).
- arm: davinci: fix the GPIO lookup for omapl138-hawk (bsc#1051510).
- arm: davinci: Use platform_device_register_full() to create pdev for dm365's eDMA (bsc#1051510).
- arm: DRA722: remove redundant definition of 1.0 device (bsc#1051510).
- arm: fix return value of parse_cpu_capacity (bsc#1051510).
- arm: kexec: fix failure to boot crash kernel (bsc#1051510).
- arm: kexec: fix kdump register saving on panic() (bsc#1051510).
- arm: keystone: fix platform_domain_notifier array overrun (bsc#1051510).
- arm: kvm: fix building with gcc-8 (bsc#1051510).
- arm: multi_v7_defconfig: Replace DRM_RCAR_HDMI by generic bridge options (bsc#1051510).
- arm: multi_v7_defconfig: Replace SND_SOC_RSRC_CARD by SND_SIMPLE_SCU_CARD (bsc#1051510).
- arm: mvebu: Fix broken PL310_ERRATA_753970 selects (bsc#1051510).
- arm: OMAP1: clock: Fix debugfs_create_*() usage (bsc#1051510).
- arm: OMAP2+: Fix SRAM virt to phys translation for save_secure_ram_context (bsc#1051510).
- arm: omap2: hide omap3_save_secure_ram on non-OMAP3 builds (bsc#1051510).
- arm: OMAP2+: omap_device: drop broken RPM status update from suspend_noirq (bsc#1051510).
- arm: OMAP2+: powerdomain: use raw_smp_processor_id() for trace (bsc#1051510).
- arm: OMAP2+: timer: fix a kmemleak caused in omap_get_timer_dt (bsc#1051510).
- arm: OMAP3: Fix prm wake interrupt for resume (bsc#1051510).
- arm: OMAP3: hwmod_data: add missing module_offs for MMC3 (bsc#1051510).
- arm: OMAP3+: PRM: fix of_irq_get() result check (bsc#1051510).
- arm: OMAP4+: PRM: fix of_irq_get() result checks (bsc#1051510).
- arm: OMAP: Fix dmtimer init for omap1 (bsc#1051510).
- arm: OMAP: Fix SRAM W+X mapping (bsc#1051510).
- arm: orion5x: Revert commit 4904dbda41c8 (bsc#1051510).
- arm: orion: fix orion_ge00_switch_board_info initialization (bsc#1051510).
- arm: pxa: select both FB and FB_W100 for eseries (bsc#1051510).
- arm: pxa/tosa-bt: add MODULE_LICENSE tag (bsc#1051510).
- arm: remove wrong CONFIG_PROC_SYSCTL ifdef (bsc#1051510).
- arm: s3c24xx: Fix NAND ECC mode for mini2440 board (bsc#1051510).
- arm: shmobile: defconfig: Enable missing PCIE_RCAR dependency (bsc#1051510).
- arm: shmobile: defconfig: Replace DRM_RCAR_HDMI by generic bridge options (bsc#1051510).
- arm: shmobile: defconfig: Replace SND_SOC_RSRC_CARD by SND_SIMPLE_SCU_CARD (bsc#1051510).
- arm: shmobile: defconfig: Replace USB_XHCI_RCAR by USB_XHCI_PLATFORM (bsc#1051510).
- arm: shmobile: rcar-gen2: Fix deadlock in regulator quirk (bsc#1051510).
- arm: socfpga_defconfig: Remove QSPI Sector 4K size force (bsc#1051510).
- arm: spear13xx: Fix dmas cells (bsc#1051510).
- arm: sunxi_defconfig: Enable CMA (bsc#1051510).
- arm: sunxi: fix the core number of V3s in sunxi README (bsc#1051510).
- asoc: dpcm: fix BE dai not hw_free and shutdown (bsc#1051510).
- asoc: topology: Add missing clock gating parameter when parsing hw_configs (bsc#1051510).
- asoc: topology: Fix bclk and fsync inversion in set_link_hw_format() (bsc#1051510).
- ata: do not schedule hot plug if it is a sas host ().
- ath: Add regulatory mapping for APL13_WORLD (bsc#1051510).
- ath: Add regulatory mapping for APL2_FCCA (bsc#1051510).
- ath: Add regulatory mapping for Bahamas (bsc#1051510).
- ath: Add regulatory mapping for Bermuda (bsc#1051510).
- ath: Add regulatory mapping for ETSI8_WORLD (bsc#1051510).
- ath: Add regulatory mapping for FCC3_ETSIC (bsc#1051510).
- ath: Add regulatory mapping for Serbia (bsc#1051510).
- ath: Add regulatory mapping for Tanzania (bsc#1051510).
- ath: Add regulatory mapping for Uganda (bsc#1051510).
- audit: fix potential null dereference 'context->module.name' (bsc#1051510).
- backlight: pwm_bl: Do not use GPIOF_* with gpiod_get_direction (bsc#1051510).
- bdi: Move cgroup bdi_writeback to a dedicated low concurrency workqueue (bsc#1101867).
- befs_lookup(): use d_splice_alias() (bsc#1101844).
- block: Fix transfer when chunk sectors exceeds max (bsc#1101874).
- bluetooth: btusb: Add a new Realtek 8723DE ID 2ff8:b011 (bsc#1051510).
- bluetooth: btusb: add ID for LiteOn 04ca:301a (bsc#1051510).
- bluetooth: hci_qca: Fix 'Sleep inside atomic section' warning (bsc#1051510).
- branch-check: fix long->int truncation when profiling branches (bsc#1101116,).
- brcmfmac: Add support for bcm43364 wireless chipset (bsc#1051510).
- cachefiles: Fix missing clear of the CACHEFILES_OBJECT_ACTIVE flag (bsc#1099858).
- cachefiles: Fix refcounting bug in backing-file read monitoring (bsc#1099858).
- cachefiles: Wait rather than BUG'ing on 'Unexpected object collision' (bsc#1099858).
- can: dev: increase bus-off message severity (bsc#1051510).
- can: ems_usb: Fix memory leak on ems_usb_disconnect() (bsc#1051510).
- can: m_can: change comparison to bitshift when dealing with a mask (bsc#1051510).
- cdrom: do not call check_disk_change() inside cdrom_open() (bsc#1101872).
- clk: at91: fix clk-generated compilation (bsc#1051510).
- clk: renesas: cpg-mssr: Stop using printk format %pCr (bsc#1051510).
- coccinelle: fix parallel build with CHECK=scripts/coccicheck (bsc#1051510).
- compiler.h: enable builtin overflow checkers and add fallback code (bsc#1101116,).
- cpufreq: intel_pstate: Limit the scope of HWP dynamic boost platforms (bsc#1066110).
- cpu/hotplug: Make bringup/teardown of smp threads symmetric (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- crypto: authenc - do not leak pointers to authenc keys (bsc#1051510).
- crypto: authencesn - do not leak pointers to authenc keys (bsc#1051510).
- crypto: padlock-aes - Fix Nano workaround data corruption (bsc#1051510).
- delayacct: fix crash in delayacct_blkio_end() after delayacct init failure (bsc#1104066).
- dm: add writecache target (bsc#1101116,).
- dm: prevent DAX mounts if not supported (bsc#1103917).
- dm writecache: support optional offset for start of device (bsc#1101116,).
- dm writecache: use 2-factor allocator arguments (bsc#1101116,).
- doc: Add vendor prefix for Kieback & Peter GmbH (bsc#1051510).
- drivers: soc: sunxi: fix error processing on base address when claiming (bsc#1051510).
- drm: Add DP PSR2 sink enable bit (bsc#1051510).
- drm/amdgpu: Remove VRAM from shared bo domains (bsc#1051510).
- drm/atomic: Check old_plane_state->crtc in drm_atomic_helper_async_check() (bsc#1051510).
- drm/atomic: Handling the case when setting old crtc for plane (bsc#1051510).
- drm/atomic-helper: Drop plane->fb references only for drm_atomic_helper_shutdown() (bsc#1051510).
- drm/atomic: Initialize variables in drm_atomic_helper_async_check() to make gcc happy (bsc#1051510).
- drm/atomic: Make async plane update checks work as intended, v2 (bsc#1051510).
- drm/atomic: Make atomic helper track newly assigned planes correctly, v2 (bsc#1051510).
- drm/atomic: Make atomic iterators less surprising (bsc#1051510).
- drm/dp/mst: Fix off-by-one typo when dump payload table (bsc#1051510).
- drm/gma500: fix psb_intel_lvds_mode_valid()'s return type (bsc#1051510).
- drm/nouveau/fifo/gk104-: poll for runlist update completion (bsc#1051510).
- drm/radeon: fix mode_valid's return type (bsc#1051510).
- drm: re-enable error handling (bsc#1051510).
- drm/vc4: Reset ->{x, y}_scaling[1] when dealing with uniplanar formats (bsc#1051510).
- Enable / support pinctrl-lewisburg ()
- ext2: fix a block leak (bsc#1101875).
- ext4: add more mount time checks of the superblock (bsc#1101900).
- ext4: bubble errors from ext4_find_inline_data_nolock() up to ext4_iget() (bsc#1101896).
- ext4: check superblock mapped prior to committing (bsc#1101902).
- ext4: do not update s_last_mounted of a frozen fs (bsc#1101841).
- ext4: factor out helper ext4_sample_last_mounted() (bsc#1101841).
- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).
- ext4: fix fencepost error in check for inode count overflow during resize (bsc#1101853).
- ext4: include the illegal physical block in the bad map ext4_error msg (bsc#1101903).
- ext4: report delalloc reserve as non-free in statfs for project quota (bsc#1101843).
- ext4: update mtime in ext4_punch_hole even if no blocks are released (bsc#1101895).
- f2fs: call unlock_new_inode() before d_instantiate() (bsc#1101837).
- fix io_destroy()/aio_complete() race (bsc#1101852).
- Force log to disk before reading the AGF during a fstrim (bsc#1101893).
- fs: allow per-device dax status checking for filesystems (bsc#1103917).
- fscache: Allow cancelled operations to be enqueued (bsc#1099858).
- fscache: Fix hanging wait on page discarded by writeback (bsc#1101885).
- fscache: Fix reference overput in fscache_attach_object() error handling (bsc#1099858).
- fs: clear writeback errors in inode_init_always (bsc#1101882).
- fs: do not scan the inode cache before SB_BORN is set (bsc#1101883).
- genirq: Check __free_irq() return value for NULL (bsc#1103517).
- hid: hid-plantronics: Re-resend Update to map button for PTT products (bsc#1051510).
- hid: i2c-hid: check if device is there before really probing (bsc#1051510).
- hippi: Fix a Fix a possible sleep-in-atomic bug in rr_close (bsc#1051510).
- hv_netvsc: Ensure correct teardown message sequence order ().
- hv/netvsc: fix handling of fallback to single queue mode ().
- hv_netvsc: Fix net device attach on older Windows hosts ().
- hv_netvsc: set master device (bsc#1051979).
- hv_netvsc: Split netvsc_revoke_buf() and netvsc_teardown_gpadl() ().
- hv_netvsc: split sub-channel setup into async and sync ().
- hv_netvsc: Use Windows version instead of NVSP version on GPAD teardown ().
- ibmasm: do not write out of bounds in read handler (bsc#1051510).
- ibmvnic: Remove code to request error information (bsc#1104174).
- ibmvnic: Revise RX/TX queue error messages (bsc#1101331).
- ibmvnic: Update firmware error reporting with cause string (bsc#1104174).
- input: elan_i2c - add ACPI ID for lenovo ideapad 330 (bsc#1051510).
- input: elan_i2c - add another ACPI ID for Lenovo Ideapad 330-15AST (bsc#1051510).
- input: i8042 - add Lenovo LaVie Z to the i8042 reset list (bsc#1051510).
- irqchip: brcmstb-l2: Define an irq_pm_shutdown function (bsc#1051510).
- irqchip/gic: Take lock when updating irq type (bsc#1051510).
- irqchip/gic-v3: Change pr_debug message to pr_devel (bsc#1051510).
- irqchip/gic-v3: Fix the driver probe() fail due to disabled GICC entry (bsc#1051510).
- irqchip/gic-v3: Ignore disabled ITS nodes (bsc#1051510).
- irqchip/gic-v3: Use wmb() instead of smb_wmb() in gic_raise_softirq() (bsc#1051510).
- irqchip/qcom: Fix check for spurious interrupts (bsc#1051510).
- irqchip/qcom: Fix u32 comparison with value less than zero (bsc#1051510).
- isofs: fix potential memory leak in mount option parsing (bsc#1101887).
- iwlwifi: add more card IDs for 9000 series (bsc#1051510).
- iwlwifi: pcie: fix race in Rx buffer allocator (bsc#1051510).
- jump_label: Fix concurrent static_key_enable/disable() (bsc#1089343).
- jump_label: Provide hotplug context variants (bsc#1089343).
- jump_label: Reorder hotplug lock and jump_label_lock (bsc#1089343).
- kabi protect bdev_dax_supported (bsc#1103917).
- kabi protect struct ccw_device_private (bsc#1103421).
- kabi/severities: do not complain on hisi_sas internal changes ().
- kabi/severities: ignore x86_kvm_ops; lttng-modules would have to be adjusted in case they depend on this particular change
- kbuild: add '-fno-stack-check' to kernel build options (bsc#1051510).
- kbuild: Handle builtin dtb file names containing hyphens (bsc#1051510).
- kbuild: pkg: use --transform option to prefix paths in tar (bsc#1051510).
- kconfig: display recursive dependency resolution hint just once (bsc#1051510).
- kmemleak: add scheduling point to kmemleak_scan() (bsc#1051510).
- kvm: SVM: Add pause filter threshold ().
- kvm: SVM: Implement pause loop exit logic in SVM ().
- kvm: VMX: Bring the common code to header file ().
- kvm: VMX: Fix the module parameters for vmx ().
- kvm: VMX: Remove ple_window_actual_max ().
- libata: add refcounting to ata_host (git-fixes).
- libata: ensure host is free'd on error exit paths (git-fixes).
- libnvdimm, dimm: fix dpa reservation vs uninitialized label area (git-fixes).
- linvdimm, pmem: Preserve read-only setting for pmem devices (git-fixes).
- media: media-device: fix ioctl function types (bsc#1051510).
- media: rcar_jpu: Add missing clk_disable_unprepare() on error in jpu_open() (bsc#1051510).
- media: saa7164: Fix driver name in debug output (bsc#1051510).
- media: si470x: fix __be16 annotations (bsc#1051510).
- media: siano: get rid of __le32/__le16 cast warnings (bsc#1051510).
- media: tw686x: Fix incorrect vb2_mem_ops GFP flags (bsc#1051510).
- mfd: cros_ec: Fail early if we cannot identify the EC (bsc#1051510).
- mfd: fsl-imx25: Clean up irq settings during removal (bsc#1051510).
- mfd: mxs-lradc: Fix error handling in mxs_lradc_probe() (bsc#1051510).
- misc: pci_endpoint_test: Avoid triggering a BUG() (bsc#1051510).
- mmc: dw_mmc: update actual clock for mmc debugfs (bsc#1051510).
- mmc: pwrseq: Use kmalloc_array instead of stack VLA (bsc#1051510).
- mm: fix __gup_device_huge vs unmap (bsc#1101839).
- mm/kmemleak.c: make cond_resched() rate-limiting more efficient (bsc#1051510).
- mwifiex: correct histogram data with appropriate index (bsc#1051510).
- mwifiex: handle race during mwifiex_usb_disconnect (bsc#1051510).
- nohz: Fix local_timer_softirq_pending() (bsc#1051510).
- nvme: ensure forward progress during Admin passthru (git-fixes).
- nvme-fabrics: Ignore nr_io_queues option for discovery controllers (bsc#1102633).
- nvme: fixup crash on failed discovery (bsc#1103920).
- nvme.h: fixup ANA group descriptor format (bsc#1104111).
- nvme: use hw qid in trace events (bsc#1102633).
- orangefs: report attributes_mask and attributes for statx (bsc#1101832).
- orangefs: set i_size on new symlink (bsc#1101845).
- overflow.h: Add allocation size calculation helpers (bsc#1101116,).
- pci: pciehp: Assume NoCompl+ for Thunderbolt ports (bsc#1051510).
- pci: pciehp: Request control of native hotplug only if supported (bsc#1051510).
- pci: Prevent sysfs disable of device while driver is attached (bsc#1051510).
- pinctrl: at91-pio4: add missing of_node_put (bsc#1051510).
- pinctrl: intel: Add Intel Lewisburg GPIO support ().
- pinctrl: nand: meson-gxl: fix missing data pins (bsc#1051510).
- pmem: only set QUEUE_FLAG_DAX for fsdax mode (bsc#1103917).
- qed*: Add link change count value to ethtool statistics display (bsc#1086314).
- qed: Add qed APIs for PHY module query (bsc#1086314 ).
- qed: Add srq core support for RoCE and iWARP (bsc#1086314 ).
- qede: Add driver callbacks for eeprom module query (bsc#1086314 ).
- qed: fix spelling mistake 'successffuly' -> 'successfully' (bsc#1086314).
- qed: Make some functions static (bsc#1086314).
- qed: remove redundant functions qed_get_cm_pq_idx_rl (bsc#1086314).
- qed: remove redundant functions qed_set_gft_event_id_cm_hdr (bsc#1086314).
- qed: remove redundant pointer 'name' (bsc#1086314).
- qed: use dma_zalloc_coherent instead of allocator/memset (bsc#1086314).
- qed*: Utilize FW 8.37.2.0 (bsc#1086314).
- RDMA/qedr: Fix NULL pointer dereference when running over iWARP without RDMA-CM (bsc#1086314).
- RDMA/qedr: fix spelling mistake: 'adrresses' -> 'addresses' (bsc#1086314).
- RDMA/qedr: fix spelling mistake: 'failes' -> 'fails' (bsc#1086314).
- regulator: pfuze100: add .is_enable() for pfuze100_swb_regulator_ops (bsc#1051510).
- reiserfs: fix buffer overflow with long warning messages (bsc#1101847).
- Revert 'drm/nouveau/drm/therm/fan: add a fallback if no fan control is specified in the vbios' (bsc#1103356).
- s390/cio: clear timer when terminating driver I/O (bsc#1103421).
- s390/cio: fix return code after missing interrupt (bsc#1103421).
- s390/dasd: fix handling of internal requests (bsc#1103421).
- s390/dasd: fix wrongly assigned configuration data (bsc#1103421).
- s390/dasd: prevent prefix I/O error (bsc#1103421).
- s390/eadm: fix CONFIG_BLOCK include dependency (bsc#1103421).
- s390/ipl: ensure loadparm valid flag is set (bsc#1103421).
- s390/pci: do not require AIS facility (bsc#1103421).
- s390/qdio: do not release memory in qdio_setup_irq() (bsc#1103421).
- sc16is7xx: Check for an error when the clock is enabled (bsc#1051510).
- sched/fair: Consider RT/IRQ pressure in capacity_spare_wake() (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Fix find_idlest_group() when local group is not allowed (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Fix usage of find_idlest_group() when no groups are allowed (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Fix usage of find_idlest_group() when the local group is idlest (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Move select_task_rq_fair() slow-path into its own function (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Remove impossible condition from find_idlest_group_cpu() (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Remove unnecessary comparison with -1 (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Spare idle load balancing on nohz_full CPUs (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Use 'unsigned long' for utilization, consistently (bnc#1101669 optimise numa balancing for fast migrate).
- sched/smt: Update sched_smt_present at runtime (bsc#1089343).
- scsi: ata: enhance the definition of SET MAX feature field value ().
- scsi: hisi_sas: add an mechanism to do reset work synchronously ().
- scsi: hisi_sas: add check of device in hisi_sas_task_exec() ().
- scsi: hisi_sas: add internal abort dev in some places ().
- scsi: hisi_sas: Add LED feature for v3 hw ().
- scsi: hisi_sas: add RAS feature for v3 hw ().
- scsi: hisi_sas: add readl poll timeout helper wrappers ().
- scsi: hisi_sas: Add some checks to avoid free'ing a sas_task twice ().
- scsi: hisi_sas: add some print to enhance debugging ().
- scsi: hisi_sas: Add v2 hw force PHY function for internal ATA command ().
- scsi: hisi_sas: add v2 hw port AXI error handling support ().
- scsi: hisi_sas: add v3 hw MODULE_DEVICE_TABLE() ().
- scsi: hisi_sas: add v3 hw suspend and resume ().
- scsi: hisi_sas: allocate slot buffer earlier ().
- scsi: hisi_sas: Change common allocation mode of device id ().
- scsi: hisi_sas: Change frame type for SET MAX commands ().
- scsi: hisi_sas: change ncq process for v3 hw ().
- scsi: hisi_sas: change slot index allocation mode ().
- scsi: hisi_sas: check host frozen before calling 'done' function ().
- scsi: hisi_sas: check IPTT is valid before using it for v3 hw ().
- scsi: hisi_sas: check sas_dev gone earlier in hisi_sas_abort_task() ().
- scsi: hisi_sas: Code cleanup and minor bug fixes ().
- scsi: hisi_sas: config ATA de-reset as an constrained command for v3 hw ().
- scsi: hisi_sas: consolidate command check in hisi_sas_get_ata_protocol() ().
- scsi: hisi_sas: Create a scsi_host_template per HW module ().
- scsi: hisi_sas: delete timer when removing hisi_sas driver ().
- scsi: hisi_sas: do link reset for some CHL_INT2 ints ().
- scsi: hisi_sas: Do not lock DQ for complete task sending ().
- scsi: hisi_sas: dt-bindings: add an property of signal attenuation ().
- scsi: hisi_sas: fix a bug in hisi_sas_dev_gone() ().
- scsi: hisi_sas: fix a typo in hisi_sas_task_prep() ().
- scsi: hisi_sas: fix dma_unmap_sg() parameter ().
- scsi: hisi_sas: fix PI memory size ().
- scsi: hisi_sas: fix return value of hisi_sas_task_prep() ().
- scsi: hisi_sas: Fix return value when get_free_slot() failed ().
- scsi: hisi_sas: fix SAS_QUEUE_FULL problem while running IO ().
- scsi: hisi_sas: fix the issue of link rate inconsistency ().
- scsi: hisi_sas: fix the issue of setting linkrate register ().
- scsi: hisi_sas: improve int_chnl_int_v2_hw() consistency with v3 hw ().
- scsi: hisi_sas: Include TMF elements in struct hisi_sas_slot ().
- scsi: hisi_sas: increase timer expire of internal abort task ().
- scsi: hisi_sas: Init disks after controller reset ().
- scsi: hisi_sas: initialize dq spinlock before use ().
- scsi: hisi_sas: Introduce hisi_sas_phy_set_linkrate() ().
- scsi: hisi_sas: judge result of internal abort ().
- scsi: hisi_sas: make local symbol host_attrs static ().
- scsi: hisi_sas: make return type of prep functions void ().
- scsi: hisi_sas: make SAS address of SATA disks unique ().
- scsi: hisi_sas: Mark PHY as in reset for nexus reset ().
- scsi: hisi_sas: modify hisi_sas_dev_gone() for reset ().
- scsi: hisi_sas: modify some register config for hip08 ().
- scsi: hisi_sas: optimise port id refresh function ().
- scsi: hisi_sas: optimise the usage of DQ locking ().
- scsi: hisi_sas: print device id for errors ().
- scsi: hisi_sas: re-add the lldd_port_deformed() ().
- scsi: hisi_sas: relocate clearing ITCT and freeing device ().
- scsi: hisi_sas: relocate smp sg map ().
- scsi: hisi_sas: Remove depends on HAS_DMA in case of platform dependency ().
- scsi: hisi_sas: remove redundant handling to event95 for v3 ().
- scsi: hisi_sas: remove some unneeded structure members ().
- scsi: hisi_sas: remove unused variable hisi_sas_devices.running_req ().
- scsi: hisi_sas: Reset disks when discovered ().
- scsi: hisi_sas: some optimizations of host controller reset ().
- scsi: hisi_sas: stop controller timer for reset ().
- scsi: hisi_sas: support the property of signal attenuation for v2 hw ().
- scsi: hisi_sas: Terminate STP reject quickly for v2 hw ().
- scsi: hisi_sas: Try wait commands before before controller reset ().
- scsi: hisi_sas: update PHY linkrate after a controller reset ().
- scsi: hisi_sas: update RAS feature for later revision of v3 HW ().
- scsi: hisi_sas: use an general way to delay PHY work ().
- scsi: hisi_sas: Use device lock to protect slot alloc/free ().
- scsi: hisi_sas: use dma_zalloc_coherent() ().
- scsi: hisi_sas: workaround a v3 hw hilink bug ().
- scsi: libsas: defer ata device eh commands to libata ().
- scsi: lpfc: Add Buffer overflow check, when nvme_info larger than PAGE_SIZE (bsc#1102658).
- scsi: lpfc: Correct LCB ACCept payload (bsc#1102658).
- scsi: lpfc: devloss timeout race condition caused null pointer reference (bsc#1102658).
- scsi: lpfc: Fix abort error path for NVMET (bsc#1102658).
- scsi: lpfc: Fix driver crash when re-registering NVME rports (bsc#1102658).
- scsi: lpfc: Fix driver not setting dpp bits correctly in doorbell word (bsc#1102658).
- scsi: lpfc: Fix ELS abort on SLI-3 adapters (bsc#1102658).
- scsi: lpfc: Fix list corruption on the completion queue (bsc#1102658).
- scsi: lpfc: Fix NVME Target crash in defer rcv logic (bsc#1102658).
- scsi: lpfc: Fix panic if driver unloaded when port is offline (bsc#1102658).
- scsi: lpfc: Fix sysfs Speed value on CNA ports (bsc#1102658).
- scsi: lpfc: Limit tracking of tgt queue depth in fast path (bsc#1102658).
- scsi: lpfc: Make PBDE optimizations configurable (bsc#1102658).
- scsi: lpfc: Remove lpfc_enable_pbde as module parameter (bsc#1102658).
- scsi: lpfc: Revise copyright for new company language (bsc#1102658).
- scsi: lpfc: Support duration field in Link Cable Beacon V1 command (bsc#1102658).
- scsi: lpfc: update driver version to 12.0.0.5 (bsc#1102658).
- scsi: lpfc: update driver version to 12.0.0.6 (bsc#1102658).
- scsi: qla2xxx: Avoid double completion of abort command (git-fixes).
- scsi: qla2xxx: Fix driver unload by shutting down chip (git-fixes).
- scsi: qla2xxx: Fix NPIV deletion by calling wait_for_sess_deletion (git-fixes).
- scsi: qla2xxx: Fix NULL pointer dereference for fcport search (git-fixes).
- scsi: qla2xxx: Fix unintialized List head crash (git-fixes).
- scsi: qla2xxx: Return error when TMF returns (git-fixes).
- scsi: smartpqi: add in new supported controllers (bsc#1086274).
- scsi: smartpqi: add inspur advantech ids (bsc#1086274).
- scsi: smartpqi: bump driver version to 1.1.4-130 (bsc#1086274).
- scsi: smartpqi: fix critical ARM issue reading PQI index registers (bsc#1086274).
- scsi: smartpqi: improve error checking for sync requests (bsc#1086274).
- scsi: smartpqi: improve handling for sync requests (bsc#1086274).
- scsi: smartpqi: update driver version (bsc#1086274).
- scsi: smartpqi: workaround fw bug for oq deletion (bsc#1086274).
- sctp: fix the issue that pathmtu may be set lower than MINSEGMENT (git-fixes).
- sctp: introduce sctp_dst_mtu (git-fixes).
- soc: bcm2835: Make !RASPBERRYPI_FIRMWARE dummies return failure (bsc#1051510).
- soc: bcm: raspberrypi-power: Fix use of __packed (bsc#1051510).
- soc: imx: gpc: de-register power domains only if initialized (bsc#1051510).
- soc: imx: gpc: restrict register range for regmap access (bsc#1051510).
- soc: imx: gpcv2: correct PGC offset (bsc#1051510).
- soc: imx: gpcv2: Do not pass static memory as platform data (bsc#1051510).
- soc: imx: gpcv2: fix regulator deferred probe (bsc#1051510).
- soc: mediatek: pwrap: fix compiler errors (bsc#1051510).
- soc: qcom: wcnss_ctrl: Fix increment in NV upload (bsc#1051510).
- soc: rockchip: power-domain: Fix wrong value when power up pd with writemask (bsc#1051510).
- soc/tegra: Fix bad of_node_put() in powergate init (bsc#1051510).
- soc/tegra: flowctrl: Fix error handling (bsc#1051510).
- soc: ti: ti_sci_pm_domains: Populate name for genpd (bsc#1051510).
- soc: zte: Restrict SOC_ZTE to ARCH_ZX or COMPILE_TEST (bsc#1051510).
- spi: bcm2835aux: ensure interrupts are enabled for shared handler (bsc#1051510).
- spi/bcm63xx-hspi: Enable the clock before calling clk_get_rate() (bsc#1051510).
- spi: bcm-qspi: Always read and set BSPI_MAST_N_BOOT_CTRL (bsc#1051510).
- spi: bcm-qspi: Avoid setting MSPI_CDRAM_PCS for spi-nor master (bsc#1051510).
- spi: cadence: Add usleep_range() for cdns_spi_fill_tx_fifo() (bsc#1051510).
- spi: pxa2xx: Allow 64-bit DMA (bsc#1051510).
- spi: pxa2xx: check clk_prepare_enable() return value (bsc#1051510).
- sr: pass down correctly sized SCSI sense buffer (git-fixes).
- staging: ks7010: Use constants from ieee80211_eid instead of literal ints (bsc#1051510).
- staging: speakup: fix wraparound in uaccess length check (bsc#1051510).
- supported.conf: add drivers/md/dm-writecache
- sysrq : fix Show Regs call trace on ARM (bsc#1051510).
- thermal: exynos: fix setting rising_threshold for Exynos5433 (bsc#1051510).
- tty: Fix data race in tty_insert_flip_string_fixed_flag (bsc#1051510).
- typec: tcpm: Fix a msecs vs jiffies bug (bsc#1100132).
- udf: Detect incorrect directory size (bsc#1101891).
- udf: Provide saner default for invalid uid / gid (bsc#1101890).
- Update config files to add CONFIG_DM_WRITECACHE=m
- Update patches.arch/KVM-PPC-Check-if-IOMMU-page-is-contained-in-the-pinn.patch (bsc#1077761, git-fixes, bsc#1103948, bsc#1103949).
- usb: hub: Do not wait for connect state at resume for powered-off ports (bsc#1051510).
- usbip: usbip_detach: Fix memory, udev context and udev leak (bsc#1051510).
- vfs: add the sb_start_intwrite_trylock() helper (bsc#1101841).
- virtio_balloon: fix another race between migration and ballooning (bsc#1051510).
- wlcore: sdio: check for valid platform device data before suspend (bsc#1051510).
- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/KVM/VMX: Add module argument for L1TF mitigation.
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- x86: Treat R_X86_64_PLT32 as R_X86_64_PC32 (binutils_2.31).
- xfs: catch inode allocation state mismatch corruption (bsc#1104211).
- xfs: prevent creating negative-sized file via INSERT_RANGE (bsc#1101833).
Patchnames
SUSE-SLE-Module-Basesystem-15-2018-1614,SUSE-SLE-Module-Development-Tools-15-2018-1614,SUSE-SLE-Module-Legacy-15-2018-1614,SUSE-SLE-Product-HA-15-2018-1614,SUSE-SLE-Product-WE-15-2018-1614
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).\n- CVE-2018-5391 aka \u0027FragmentSmack\u0027: A flaw in the IP packet reassembly could be used by remote attackers to consume lots of CPU time (bnc#1103097).\n- CVE-2018-10876: A flaw was found in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image. (bnc#1099811)\n- CVE-2018-10877: The ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image. (bnc#1099846)\n- CVE-2018-10878: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image. (bnc#1099813)\n- CVE-2018-10879: A flaw was found in the ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image. (bnc#1099844)\n- CVE-2018-10880: Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service. (bnc#1099845)\n- CVE-2018-10881: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099864)\n- CVE-2018-10882: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image. (bnc#1099849)\n- CVE-2018-10883: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099863)\n\nThe following non-security bugs were fixed:\n\n- acpi / lpss: Only call pwm_add_table() for Bay Trail PWM if PMIC HRV is 2 (bsc#1051510).\n- af_key: Always verify length of provided sadb_key (bsc#1051510).\n- af_key: fix buffer overread in parse_exthdrs() (bsc#1051510).\n- af_key: fix buffer overread in verify_address_len() (bsc#1051510).\n- afs: Fix directory permissions check (bsc#1101828).\n- agp: uninorth: make two functions static (bsc#1051510).\n- alsa: emu10k1: add error handling for snd_ctl_add (bsc#1051510).\n- alsa: emu10k1: Rate-limit error messages about page errors (bsc#1051510).\n- alsa: fm801: add error handling for snd_ctl_add (bsc#1051510).\n- alsa: usb-audio: Apply rate limit to warning messages in URB complete callback (bsc#1051510).\n- arm64: Correct type for PUD macros (bsc#1103723).\n- arm64: Disable unhandled signal log messages by default (bsc#1103724).\n- arm64: kvm: fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1103725).\n- arm64: mm: Fix set_memory_valid() declaration (bsc#1103726).\n- arm64: perf: correct PMUVer probing (bsc#1103727).\n- arm64: ptrace: Avoid setting compat FPR to garbage if get_user fails (bsc#1103728).\n- arm64: spinlock: Fix theoretical trylock() A-B-A with LSE atomics (bsc#1103729).\n- arm64: vdso: fix clock_getres for 4GiB-aligned res (bsc#1103730).\n- arm: 8715/1: add a private asm/unaligned.h (bsc#1051510).\n- arm: 8720/1: ensure dump_instr() checks addr_limit (bsc#1051510).\n- arm: 8721/1: mm: dump: check hardware RO bit for LPAE (bsc#1051510).\n- arm: 8722/1: mm: make STRICT_KERNEL_RWX effective for LPAE (bsc#1051510).\n- arm: 8731/1: Fix csum_partial_copy_from_user() stack mismatch (bsc#1051510).\n- arm: 8743/1: bL_switcher: add MODULE_LICENSE tag (bsc#1051510).\n- arm: 8746/1: vfp: Go back to clearing vfp_current_hw_state[] (bsc#1051510).\n- arm: 8748/1: mm: Define vdso_start, vdso_end as array (bsc#1051510).\n- arm: 8753/1: decompressor: add a missing parameter to the addruart macro (bsc#1051510).\n- arm: 8758/1: decompressor: restore r1 and r2 just before jumping to the kernel (bsc#1051510).\n- arm: 8764/1: kgdb: fix NUMREGBYTES so that gdb_regs[] is the correct size (bsc#1051510).\n- arm: 8769/1: kprobes: Fix to use get_kprobe_ctlblk after irq-disabed (bsc#1051510).\n- arm: 8770/1: kprobes: Prohibit probing on optimized_callback (bsc#1051510).\n- arm: 8771/1: kprobes: Prohibit kprobes on do_undefinstr (bsc#1051510).\n- arm: 8772/1: kprobes: Prohibit kprobes on get_user functions (bsc#1051510).\n- arm: AM33xx: PRM: Remove am33xx_pwrdm_read_prev_pwrst function (bsc#1051510).\n- arm: amba: Fix race condition with driver_override (bsc#1051510).\n- arm: amba: Fix wrong indentation in driver_override_store() (bsc#1051510).\n- arm: amba: Make driver_override output consistent with other buses (bsc#1051510).\n- arm: at91: do not select CONFIG_ARM_CPU_SUSPEND for old platforms (bsc#1051510).\n- arm: avoid faulting on qemu (bsc#1051510).\n- arm: BUG if jumping to usermode address in kernel mode (bsc#1051510).\n- arm-ccn: perf: Prevent module unload while PMU is in use (bsc#1051510).\n- arm: davinci: Add dma_mask to dm365\u0027s eDMA device (bsc#1051510).\n- arm: davinci: board-da830-evm: fix GPIO lookup for MMC/SD (bsc#1051510).\n- arm: davinci: board-da850-evm: fix GPIO lookup for MMC/SD (bsc#1051510).\n- arm: davinci: board-da850-evm: fix WP pin polarity for MMC/SD (bsc#1051510).\n- arm: davinci: board-dm355-evm: fix broken networking (bsc#1051510).\n- arm: davinci: board-dm646x-evm: pass correct I2C adapter id for VPIF (bsc#1051510).\n- arm: davinci: board-dm646x-evm: set VPIF capture card name (bsc#1051510).\n- arm: davinci: board-omapl138-hawk: fix GPIO numbers for MMC/SD lookup (bsc#1051510).\n- arm: davinci: dm646x: fix timer interrupt generation (bsc#1051510).\n- arm: davinci: fix mmc entries in dm365\u0027s dma_slave_map (bsc#1051510).\n- arm: davinci: fix the GPIO lookup for omapl138-hawk (bsc#1051510).\n- arm: davinci: Use platform_device_register_full() to create pdev for dm365\u0027s eDMA (bsc#1051510).\n- arm: DRA722: remove redundant definition of 1.0 device (bsc#1051510).\n- arm: fix return value of parse_cpu_capacity (bsc#1051510).\n- arm: kexec: fix failure to boot crash kernel (bsc#1051510).\n- arm: kexec: fix kdump register saving on panic() (bsc#1051510).\n- arm: keystone: fix platform_domain_notifier array overrun (bsc#1051510).\n- arm: kvm: fix building with gcc-8 (bsc#1051510).\n- arm: multi_v7_defconfig: Replace DRM_RCAR_HDMI by generic bridge options (bsc#1051510).\n- arm: multi_v7_defconfig: Replace SND_SOC_RSRC_CARD by SND_SIMPLE_SCU_CARD (bsc#1051510).\n- arm: mvebu: Fix broken PL310_ERRATA_753970 selects (bsc#1051510).\n- arm: OMAP1: clock: Fix debugfs_create_*() usage (bsc#1051510).\n- arm: OMAP2+: Fix SRAM virt to phys translation for save_secure_ram_context (bsc#1051510).\n- arm: omap2: hide omap3_save_secure_ram on non-OMAP3 builds (bsc#1051510).\n- arm: OMAP2+: omap_device: drop broken RPM status update from suspend_noirq (bsc#1051510).\n- arm: OMAP2+: powerdomain: use raw_smp_processor_id() for trace (bsc#1051510).\n- arm: OMAP2+: timer: fix a kmemleak caused in omap_get_timer_dt (bsc#1051510).\n- arm: OMAP3: Fix prm wake interrupt for resume (bsc#1051510).\n- arm: OMAP3: hwmod_data: add missing module_offs for MMC3 (bsc#1051510).\n- arm: OMAP3+: PRM: fix of_irq_get() result check (bsc#1051510).\n- arm: OMAP4+: PRM: fix of_irq_get() result checks (bsc#1051510).\n- arm: OMAP: Fix dmtimer init for omap1 (bsc#1051510).\n- arm: OMAP: Fix SRAM W+X mapping (bsc#1051510).\n- arm: orion5x: Revert commit 4904dbda41c8 (bsc#1051510).\n- arm: orion: fix orion_ge00_switch_board_info initialization (bsc#1051510).\n- arm: pxa: select both FB and FB_W100 for eseries (bsc#1051510).\n- arm: pxa/tosa-bt: add MODULE_LICENSE tag (bsc#1051510).\n- arm: remove wrong CONFIG_PROC_SYSCTL ifdef (bsc#1051510).\n- arm: s3c24xx: Fix NAND ECC mode for mini2440 board (bsc#1051510).\n- arm: shmobile: defconfig: Enable missing PCIE_RCAR dependency (bsc#1051510).\n- arm: shmobile: defconfig: Replace DRM_RCAR_HDMI by generic bridge options (bsc#1051510).\n- arm: shmobile: defconfig: Replace SND_SOC_RSRC_CARD by SND_SIMPLE_SCU_CARD (bsc#1051510).\n- arm: shmobile: defconfig: Replace USB_XHCI_RCAR by USB_XHCI_PLATFORM (bsc#1051510).\n- arm: shmobile: rcar-gen2: Fix deadlock in regulator quirk (bsc#1051510).\n- arm: socfpga_defconfig: Remove QSPI Sector 4K size force (bsc#1051510).\n- arm: spear13xx: Fix dmas cells (bsc#1051510).\n- arm: sunxi_defconfig: Enable CMA (bsc#1051510).\n- arm: sunxi: fix the core number of V3s in sunxi README (bsc#1051510).\n- asoc: dpcm: fix BE dai not hw_free and shutdown (bsc#1051510).\n- asoc: topology: Add missing clock gating parameter when parsing hw_configs (bsc#1051510).\n- asoc: topology: Fix bclk and fsync inversion in set_link_hw_format() (bsc#1051510).\n- ata: do not schedule hot plug if it is a sas host ().\n- ath: Add regulatory mapping for APL13_WORLD (bsc#1051510).\n- ath: Add regulatory mapping for APL2_FCCA (bsc#1051510).\n- ath: Add regulatory mapping for Bahamas (bsc#1051510).\n- ath: Add regulatory mapping for Bermuda (bsc#1051510).\n- ath: Add regulatory mapping for ETSI8_WORLD (bsc#1051510).\n- ath: Add regulatory mapping for FCC3_ETSIC (bsc#1051510).\n- ath: Add regulatory mapping for Serbia (bsc#1051510).\n- ath: Add regulatory mapping for Tanzania (bsc#1051510).\n- ath: Add regulatory mapping for Uganda (bsc#1051510).\n- audit: fix potential null dereference \u0027context-\u003emodule.name\u0027 (bsc#1051510).\n- backlight: pwm_bl: Do not use GPIOF_* with gpiod_get_direction (bsc#1051510).\n- bdi: Move cgroup bdi_writeback to a dedicated low concurrency workqueue (bsc#1101867).\n- befs_lookup(): use d_splice_alias() (bsc#1101844).\n- block: Fix transfer when chunk sectors exceeds max (bsc#1101874).\n- bluetooth: btusb: Add a new Realtek 8723DE ID 2ff8:b011 (bsc#1051510).\n- bluetooth: btusb: add ID for LiteOn 04ca:301a (bsc#1051510).\n- bluetooth: hci_qca: Fix \u0027Sleep inside atomic section\u0027 warning (bsc#1051510).\n- branch-check: fix long-\u003eint truncation when profiling branches (bsc#1101116,).\n- brcmfmac: Add support for bcm43364 wireless chipset (bsc#1051510).\n- cachefiles: Fix missing clear of the CACHEFILES_OBJECT_ACTIVE flag (bsc#1099858).\n- cachefiles: Fix refcounting bug in backing-file read monitoring (bsc#1099858).\n- cachefiles: Wait rather than BUG\u0027ing on \u0027Unexpected object collision\u0027 (bsc#1099858).\n- can: dev: increase bus-off message severity (bsc#1051510).\n- can: ems_usb: Fix memory leak on ems_usb_disconnect() (bsc#1051510).\n- can: m_can: change comparison to bitshift when dealing with a mask (bsc#1051510).\n- cdrom: do not call check_disk_change() inside cdrom_open() (bsc#1101872).\n- clk: at91: fix clk-generated compilation (bsc#1051510).\n- clk: renesas: cpg-mssr: Stop using printk format %pCr (bsc#1051510).\n- coccinelle: fix parallel build with CHECK=scripts/coccicheck (bsc#1051510).\n- compiler.h: enable builtin overflow checkers and add fallback code (bsc#1101116,).\n- cpufreq: intel_pstate: Limit the scope of HWP dynamic boost platforms (bsc#1066110).\n- cpu/hotplug: Make bringup/teardown of smp threads symmetric (bsc#1089343).\n- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).\n- cpu/hotplug: Split do_cpu_down() (bsc#1089343).\n- crypto: authenc - do not leak pointers to authenc keys (bsc#1051510).\n- crypto: authencesn - do not leak pointers to authenc keys (bsc#1051510).\n- crypto: padlock-aes - Fix Nano workaround data corruption (bsc#1051510).\n- delayacct: fix crash in delayacct_blkio_end() after delayacct init failure (bsc#1104066).\n- dm: add writecache target (bsc#1101116,).\n- dm: prevent DAX mounts if not supported (bsc#1103917).\n- dm writecache: support optional offset for start of device (bsc#1101116,).\n- dm writecache: use 2-factor allocator arguments (bsc#1101116,).\n- doc: Add vendor prefix for Kieback \u0026 Peter GmbH (bsc#1051510).\n- drivers: soc: sunxi: fix error processing on base address when claiming (bsc#1051510).\n- drm: Add DP PSR2 sink enable bit (bsc#1051510).\n- drm/amdgpu: Remove VRAM from shared bo domains (bsc#1051510).\n- drm/atomic: Check old_plane_state-\u003ecrtc in drm_atomic_helper_async_check() (bsc#1051510).\n- drm/atomic: Handling the case when setting old crtc for plane (bsc#1051510).\n- drm/atomic-helper: Drop plane-\u003efb references only for drm_atomic_helper_shutdown() (bsc#1051510).\n- drm/atomic: Initialize variables in drm_atomic_helper_async_check() to make gcc happy (bsc#1051510).\n- drm/atomic: Make async plane update checks work as intended, v2 (bsc#1051510).\n- drm/atomic: Make atomic helper track newly assigned planes correctly, v2 (bsc#1051510).\n- drm/atomic: Make atomic iterators less surprising (bsc#1051510).\n- drm/dp/mst: Fix off-by-one typo when dump payload table (bsc#1051510).\n- drm/gma500: fix psb_intel_lvds_mode_valid()\u0027s return type (bsc#1051510).\n- drm/nouveau/fifo/gk104-: poll for runlist update completion (bsc#1051510).\n- drm/radeon: fix mode_valid\u0027s return type (bsc#1051510).\n- drm: re-enable error handling (bsc#1051510).\n- drm/vc4: Reset -\u003e{x, y}_scaling[1] when dealing with uniplanar formats (bsc#1051510).\n- Enable / support pinctrl-lewisburg ()\n- ext2: fix a block leak (bsc#1101875).\n- ext4: add more mount time checks of the superblock (bsc#1101900).\n- ext4: bubble errors from ext4_find_inline_data_nolock() up to ext4_iget() (bsc#1101896).\n- ext4: check superblock mapped prior to committing (bsc#1101902).\n- ext4: do not update s_last_mounted of a frozen fs (bsc#1101841).\n- ext4: factor out helper ext4_sample_last_mounted() (bsc#1101841).\n- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).\n- ext4: fix fencepost error in check for inode count overflow during resize (bsc#1101853).\n- ext4: include the illegal physical block in the bad map ext4_error msg (bsc#1101903).\n- ext4: report delalloc reserve as non-free in statfs for project quota (bsc#1101843).\n- ext4: update mtime in ext4_punch_hole even if no blocks are released (bsc#1101895).\n- f2fs: call unlock_new_inode() before d_instantiate() (bsc#1101837).\n- fix io_destroy()/aio_complete() race (bsc#1101852).\n- Force log to disk before reading the AGF during a fstrim (bsc#1101893).\n- fs: allow per-device dax status checking for filesystems (bsc#1103917).\n- fscache: Allow cancelled operations to be enqueued (bsc#1099858).\n- fscache: Fix hanging wait on page discarded by writeback (bsc#1101885).\n- fscache: Fix reference overput in fscache_attach_object() error handling (bsc#1099858).\n- fs: clear writeback errors in inode_init_always (bsc#1101882).\n- fs: do not scan the inode cache before SB_BORN is set (bsc#1101883).\n- genirq: Check __free_irq() return value for NULL (bsc#1103517).\n- hid: hid-plantronics: Re-resend Update to map button for PTT products (bsc#1051510).\n- hid: i2c-hid: check if device is there before really probing (bsc#1051510).\n- hippi: Fix a Fix a possible sleep-in-atomic bug in rr_close (bsc#1051510).\n- hv_netvsc: Ensure correct teardown message sequence order ().\n- hv/netvsc: fix handling of fallback to single queue mode ().\n- hv_netvsc: Fix net device attach on older Windows hosts ().\n- hv_netvsc: set master device (bsc#1051979).\n- hv_netvsc: Split netvsc_revoke_buf() and netvsc_teardown_gpadl() ().\n- hv_netvsc: split sub-channel setup into async and sync ().\n- hv_netvsc: Use Windows version instead of NVSP version on GPAD teardown ().\n- ibmasm: do not write out of bounds in read handler (bsc#1051510).\n- ibmvnic: Remove code to request error information (bsc#1104174).\n- ibmvnic: Revise RX/TX queue error messages (bsc#1101331).\n- ibmvnic: Update firmware error reporting with cause string (bsc#1104174).\n- input: elan_i2c - add ACPI ID for lenovo ideapad 330 (bsc#1051510).\n- input: elan_i2c - add another ACPI ID for Lenovo Ideapad 330-15AST (bsc#1051510).\n- input: i8042 - add Lenovo LaVie Z to the i8042 reset list (bsc#1051510).\n- irqchip: brcmstb-l2: Define an irq_pm_shutdown function (bsc#1051510).\n- irqchip/gic: Take lock when updating irq type (bsc#1051510).\n- irqchip/gic-v3: Change pr_debug message to pr_devel (bsc#1051510).\n- irqchip/gic-v3: Fix the driver probe() fail due to disabled GICC entry (bsc#1051510).\n- irqchip/gic-v3: Ignore disabled ITS nodes (bsc#1051510).\n- irqchip/gic-v3: Use wmb() instead of smb_wmb() in gic_raise_softirq() (bsc#1051510).\n- irqchip/qcom: Fix check for spurious interrupts (bsc#1051510).\n- irqchip/qcom: Fix u32 comparison with value less than zero (bsc#1051510).\n- isofs: fix potential memory leak in mount option parsing (bsc#1101887).\n- iwlwifi: add more card IDs for 9000 series (bsc#1051510).\n- iwlwifi: pcie: fix race in Rx buffer allocator (bsc#1051510).\n- jump_label: Fix concurrent static_key_enable/disable() (bsc#1089343).\n- jump_label: Provide hotplug context variants (bsc#1089343).\n- jump_label: Reorder hotplug lock and jump_label_lock (bsc#1089343).\n- kabi protect bdev_dax_supported (bsc#1103917).\n- kabi protect struct ccw_device_private (bsc#1103421).\n- kabi/severities: do not complain on hisi_sas internal changes ().\n- kabi/severities: ignore x86_kvm_ops; lttng-modules would have to be adjusted in case they depend on this particular change\n- kbuild: add \u0027-fno-stack-check\u0027 to kernel build options (bsc#1051510).\n- kbuild: Handle builtin dtb file names containing hyphens (bsc#1051510).\n- kbuild: pkg: use --transform option to prefix paths in tar (bsc#1051510).\n- kconfig: display recursive dependency resolution hint just once (bsc#1051510).\n- kmemleak: add scheduling point to kmemleak_scan() (bsc#1051510).\n- kvm: SVM: Add pause filter threshold ().\n- kvm: SVM: Implement pause loop exit logic in SVM ().\n- kvm: VMX: Bring the common code to header file ().\n- kvm: VMX: Fix the module parameters for vmx ().\n- kvm: VMX: Remove ple_window_actual_max ().\n- libata: add refcounting to ata_host (git-fixes).\n- libata: ensure host is free\u0027d on error exit paths (git-fixes).\n- libnvdimm, dimm: fix dpa reservation vs uninitialized label area (git-fixes).\n- linvdimm, pmem: Preserve read-only setting for pmem devices (git-fixes).\n- media: media-device: fix ioctl function types (bsc#1051510).\n- media: rcar_jpu: Add missing clk_disable_unprepare() on error in jpu_open() (bsc#1051510).\n- media: saa7164: Fix driver name in debug output (bsc#1051510).\n- media: si470x: fix __be16 annotations (bsc#1051510).\n- media: siano: get rid of __le32/__le16 cast warnings (bsc#1051510).\n- media: tw686x: Fix incorrect vb2_mem_ops GFP flags (bsc#1051510).\n- mfd: cros_ec: Fail early if we cannot identify the EC (bsc#1051510).\n- mfd: fsl-imx25: Clean up irq settings during removal (bsc#1051510).\n- mfd: mxs-lradc: Fix error handling in mxs_lradc_probe() (bsc#1051510).\n- misc: pci_endpoint_test: Avoid triggering a BUG() (bsc#1051510).\n- mmc: dw_mmc: update actual clock for mmc debugfs (bsc#1051510).\n- mmc: pwrseq: Use kmalloc_array instead of stack VLA (bsc#1051510).\n- mm: fix __gup_device_huge vs unmap (bsc#1101839).\n- mm/kmemleak.c: make cond_resched() rate-limiting more efficient (bsc#1051510).\n- mwifiex: correct histogram data with appropriate index (bsc#1051510).\n- mwifiex: handle race during mwifiex_usb_disconnect (bsc#1051510).\n- nohz: Fix local_timer_softirq_pending() (bsc#1051510).\n- nvme: ensure forward progress during Admin passthru (git-fixes).\n- nvme-fabrics: Ignore nr_io_queues option for discovery controllers (bsc#1102633).\n- nvme: fixup crash on failed discovery (bsc#1103920).\n- nvme.h: fixup ANA group descriptor format (bsc#1104111).\n- nvme: use hw qid in trace events (bsc#1102633).\n- orangefs: report attributes_mask and attributes for statx (bsc#1101832).\n- orangefs: set i_size on new symlink (bsc#1101845).\n- overflow.h: Add allocation size calculation helpers (bsc#1101116,).\n- pci: pciehp: Assume NoCompl+ for Thunderbolt ports (bsc#1051510).\n- pci: pciehp: Request control of native hotplug only if supported (bsc#1051510).\n- pci: Prevent sysfs disable of device while driver is attached (bsc#1051510).\n- pinctrl: at91-pio4: add missing of_node_put (bsc#1051510).\n- pinctrl: intel: Add Intel Lewisburg GPIO support ().\n- pinctrl: nand: meson-gxl: fix missing data pins (bsc#1051510).\n- pmem: only set QUEUE_FLAG_DAX for fsdax mode (bsc#1103917).\n- qed*: Add link change count value to ethtool statistics display (bsc#1086314).\n- qed: Add qed APIs for PHY module query (bsc#1086314 ).\n- qed: Add srq core support for RoCE and iWARP (bsc#1086314 ).\n- qede: Add driver callbacks for eeprom module query (bsc#1086314 ).\n- qed: fix spelling mistake \u0027successffuly\u0027 -\u003e \u0027successfully\u0027 (bsc#1086314).\n- qed: Make some functions static (bsc#1086314).\n- qed: remove redundant functions qed_get_cm_pq_idx_rl (bsc#1086314).\n- qed: remove redundant functions qed_set_gft_event_id_cm_hdr (bsc#1086314).\n- qed: remove redundant pointer \u0027name\u0027 (bsc#1086314).\n- qed: use dma_zalloc_coherent instead of allocator/memset (bsc#1086314).\n- qed*: Utilize FW 8.37.2.0 (bsc#1086314).\n- RDMA/qedr: Fix NULL pointer dereference when running over iWARP without RDMA-CM (bsc#1086314).\n- RDMA/qedr: fix spelling mistake: \u0027adrresses\u0027 -\u003e \u0027addresses\u0027 (bsc#1086314).\n- RDMA/qedr: fix spelling mistake: \u0027failes\u0027 -\u003e \u0027fails\u0027 (bsc#1086314).\n- regulator: pfuze100: add .is_enable() for pfuze100_swb_regulator_ops (bsc#1051510).\n- reiserfs: fix buffer overflow with long warning messages (bsc#1101847).\n- Revert \u0027drm/nouveau/drm/therm/fan: add a fallback if no fan control is specified in the vbios\u0027 (bsc#1103356).\n- s390/cio: clear timer when terminating driver I/O (bsc#1103421).\n- s390/cio: fix return code after missing interrupt (bsc#1103421).\n- s390/dasd: fix handling of internal requests (bsc#1103421).\n- s390/dasd: fix wrongly assigned configuration data (bsc#1103421).\n- s390/dasd: prevent prefix I/O error (bsc#1103421).\n- s390/eadm: fix CONFIG_BLOCK include dependency (bsc#1103421).\n- s390/ipl: ensure loadparm valid flag is set (bsc#1103421).\n- s390/pci: do not require AIS facility (bsc#1103421).\n- s390/qdio: do not release memory in qdio_setup_irq() (bsc#1103421).\n- sc16is7xx: Check for an error when the clock is enabled (bsc#1051510).\n- sched/fair: Consider RT/IRQ pressure in capacity_spare_wake() (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Fix find_idlest_group() when local group is not allowed (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Fix usage of find_idlest_group() when no groups are allowed (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Fix usage of find_idlest_group() when the local group is idlest (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Move select_task_rq_fair() slow-path into its own function (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Remove impossible condition from find_idlest_group_cpu() (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Remove unnecessary comparison with -1 (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Spare idle load balancing on nohz_full CPUs (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Use \u0027unsigned long\u0027 for utilization, consistently (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/smt: Update sched_smt_present at runtime (bsc#1089343).\n- scsi: ata: enhance the definition of SET MAX feature field value ().\n- scsi: hisi_sas: add an mechanism to do reset work synchronously ().\n- scsi: hisi_sas: add check of device in hisi_sas_task_exec() ().\n- scsi: hisi_sas: add internal abort dev in some places ().\n- scsi: hisi_sas: Add LED feature for v3 hw ().\n- scsi: hisi_sas: add RAS feature for v3 hw ().\n- scsi: hisi_sas: add readl poll timeout helper wrappers ().\n- scsi: hisi_sas: Add some checks to avoid free\u0027ing a sas_task twice ().\n- scsi: hisi_sas: add some print to enhance debugging ().\n- scsi: hisi_sas: Add v2 hw force PHY function for internal ATA command ().\n- scsi: hisi_sas: add v2 hw port AXI error handling support ().\n- scsi: hisi_sas: add v3 hw MODULE_DEVICE_TABLE() ().\n- scsi: hisi_sas: add v3 hw suspend and resume ().\n- scsi: hisi_sas: allocate slot buffer earlier ().\n- scsi: hisi_sas: Change common allocation mode of device id ().\n- scsi: hisi_sas: Change frame type for SET MAX commands ().\n- scsi: hisi_sas: change ncq process for v3 hw ().\n- scsi: hisi_sas: change slot index allocation mode ().\n- scsi: hisi_sas: check host frozen before calling \u0027done\u0027 function ().\n- scsi: hisi_sas: check IPTT is valid before using it for v3 hw ().\n- scsi: hisi_sas: check sas_dev gone earlier in hisi_sas_abort_task() ().\n- scsi: hisi_sas: Code cleanup and minor bug fixes ().\n- scsi: hisi_sas: config ATA de-reset as an constrained command for v3 hw ().\n- scsi: hisi_sas: consolidate command check in hisi_sas_get_ata_protocol() ().\n- scsi: hisi_sas: Create a scsi_host_template per HW module ().\n- scsi: hisi_sas: delete timer when removing hisi_sas driver ().\n- scsi: hisi_sas: do link reset for some CHL_INT2 ints ().\n- scsi: hisi_sas: Do not lock DQ for complete task sending ().\n- scsi: hisi_sas: dt-bindings: add an property of signal attenuation ().\n- scsi: hisi_sas: fix a bug in hisi_sas_dev_gone() ().\n- scsi: hisi_sas: fix a typo in hisi_sas_task_prep() ().\n- scsi: hisi_sas: fix dma_unmap_sg() parameter ().\n- scsi: hisi_sas: fix PI memory size ().\n- scsi: hisi_sas: fix return value of hisi_sas_task_prep() ().\n- scsi: hisi_sas: Fix return value when get_free_slot() failed ().\n- scsi: hisi_sas: fix SAS_QUEUE_FULL problem while running IO ().\n- scsi: hisi_sas: fix the issue of link rate inconsistency ().\n- scsi: hisi_sas: fix the issue of setting linkrate register ().\n- scsi: hisi_sas: improve int_chnl_int_v2_hw() consistency with v3 hw ().\n- scsi: hisi_sas: Include TMF elements in struct hisi_sas_slot ().\n- scsi: hisi_sas: increase timer expire of internal abort task ().\n- scsi: hisi_sas: Init disks after controller reset ().\n- scsi: hisi_sas: initialize dq spinlock before use ().\n- scsi: hisi_sas: Introduce hisi_sas_phy_set_linkrate() ().\n- scsi: hisi_sas: judge result of internal abort ().\n- scsi: hisi_sas: make local symbol host_attrs static ().\n- scsi: hisi_sas: make return type of prep functions void ().\n- scsi: hisi_sas: make SAS address of SATA disks unique ().\n- scsi: hisi_sas: Mark PHY as in reset for nexus reset ().\n- scsi: hisi_sas: modify hisi_sas_dev_gone() for reset ().\n- scsi: hisi_sas: modify some register config for hip08 ().\n- scsi: hisi_sas: optimise port id refresh function ().\n- scsi: hisi_sas: optimise the usage of DQ locking ().\n- scsi: hisi_sas: print device id for errors ().\n- scsi: hisi_sas: re-add the lldd_port_deformed() ().\n- scsi: hisi_sas: relocate clearing ITCT and freeing device ().\n- scsi: hisi_sas: relocate smp sg map ().\n- scsi: hisi_sas: Remove depends on HAS_DMA in case of platform dependency ().\n- scsi: hisi_sas: remove redundant handling to event95 for v3 ().\n- scsi: hisi_sas: remove some unneeded structure members ().\n- scsi: hisi_sas: remove unused variable hisi_sas_devices.running_req ().\n- scsi: hisi_sas: Reset disks when discovered ().\n- scsi: hisi_sas: some optimizations of host controller reset ().\n- scsi: hisi_sas: stop controller timer for reset ().\n- scsi: hisi_sas: support the property of signal attenuation for v2 hw ().\n- scsi: hisi_sas: Terminate STP reject quickly for v2 hw ().\n- scsi: hisi_sas: Try wait commands before before controller reset ().\n- scsi: hisi_sas: update PHY linkrate after a controller reset ().\n- scsi: hisi_sas: update RAS feature for later revision of v3 HW ().\n- scsi: hisi_sas: use an general way to delay PHY work ().\n- scsi: hisi_sas: Use device lock to protect slot alloc/free ().\n- scsi: hisi_sas: use dma_zalloc_coherent() ().\n- scsi: hisi_sas: workaround a v3 hw hilink bug ().\n- scsi: libsas: defer ata device eh commands to libata ().\n- scsi: lpfc: Add Buffer overflow check, when nvme_info larger than PAGE_SIZE (bsc#1102658).\n- scsi: lpfc: Correct LCB ACCept payload (bsc#1102658).\n- scsi: lpfc: devloss timeout race condition caused null pointer reference (bsc#1102658).\n- scsi: lpfc: Fix abort error path for NVMET (bsc#1102658).\n- scsi: lpfc: Fix driver crash when re-registering NVME rports (bsc#1102658).\n- scsi: lpfc: Fix driver not setting dpp bits correctly in doorbell word (bsc#1102658).\n- scsi: lpfc: Fix ELS abort on SLI-3 adapters (bsc#1102658).\n- scsi: lpfc: Fix list corruption on the completion queue (bsc#1102658).\n- scsi: lpfc: Fix NVME Target crash in defer rcv logic (bsc#1102658).\n- scsi: lpfc: Fix panic if driver unloaded when port is offline (bsc#1102658).\n- scsi: lpfc: Fix sysfs Speed value on CNA ports (bsc#1102658).\n- scsi: lpfc: Limit tracking of tgt queue depth in fast path (bsc#1102658).\n- scsi: lpfc: Make PBDE optimizations configurable (bsc#1102658).\n- scsi: lpfc: Remove lpfc_enable_pbde as module parameter (bsc#1102658).\n- scsi: lpfc: Revise copyright for new company language (bsc#1102658).\n- scsi: lpfc: Support duration field in Link Cable Beacon V1 command (bsc#1102658).\n- scsi: lpfc: update driver version to 12.0.0.5 (bsc#1102658).\n- scsi: lpfc: update driver version to 12.0.0.6 (bsc#1102658).\n- scsi: qla2xxx: Avoid double completion of abort command (git-fixes).\n- scsi: qla2xxx: Fix driver unload by shutting down chip (git-fixes).\n- scsi: qla2xxx: Fix NPIV deletion by calling wait_for_sess_deletion (git-fixes).\n- scsi: qla2xxx: Fix NULL pointer dereference for fcport search (git-fixes).\n- scsi: qla2xxx: Fix unintialized List head crash (git-fixes).\n- scsi: qla2xxx: Return error when TMF returns (git-fixes).\n- scsi: smartpqi: add in new supported controllers (bsc#1086274).\n- scsi: smartpqi: add inspur advantech ids (bsc#1086274).\n- scsi: smartpqi: bump driver version to 1.1.4-130 (bsc#1086274).\n- scsi: smartpqi: fix critical ARM issue reading PQI index registers (bsc#1086274).\n- scsi: smartpqi: improve error checking for sync requests (bsc#1086274).\n- scsi: smartpqi: improve handling for sync requests (bsc#1086274).\n- scsi: smartpqi: update driver version (bsc#1086274).\n- scsi: smartpqi: workaround fw bug for oq deletion (bsc#1086274).\n- sctp: fix the issue that pathmtu may be set lower than MINSEGMENT (git-fixes).\n- sctp: introduce sctp_dst_mtu (git-fixes).\n- soc: bcm2835: Make !RASPBERRYPI_FIRMWARE dummies return failure (bsc#1051510).\n- soc: bcm: raspberrypi-power: Fix use of __packed (bsc#1051510).\n- soc: imx: gpc: de-register power domains only if initialized (bsc#1051510).\n- soc: imx: gpc: restrict register range for regmap access (bsc#1051510).\n- soc: imx: gpcv2: correct PGC offset (bsc#1051510).\n- soc: imx: gpcv2: Do not pass static memory as platform data (bsc#1051510).\n- soc: imx: gpcv2: fix regulator deferred probe (bsc#1051510).\n- soc: mediatek: pwrap: fix compiler errors (bsc#1051510).\n- soc: qcom: wcnss_ctrl: Fix increment in NV upload (bsc#1051510).\n- soc: rockchip: power-domain: Fix wrong value when power up pd with writemask (bsc#1051510).\n- soc/tegra: Fix bad of_node_put() in powergate init (bsc#1051510).\n- soc/tegra: flowctrl: Fix error handling (bsc#1051510).\n- soc: ti: ti_sci_pm_domains: Populate name for genpd (bsc#1051510).\n- soc: zte: Restrict SOC_ZTE to ARCH_ZX or COMPILE_TEST (bsc#1051510).\n- spi: bcm2835aux: ensure interrupts are enabled for shared handler (bsc#1051510).\n- spi/bcm63xx-hspi: Enable the clock before calling clk_get_rate() (bsc#1051510).\n- spi: bcm-qspi: Always read and set BSPI_MAST_N_BOOT_CTRL (bsc#1051510).\n- spi: bcm-qspi: Avoid setting MSPI_CDRAM_PCS for spi-nor master (bsc#1051510).\n- spi: cadence: Add usleep_range() for cdns_spi_fill_tx_fifo() (bsc#1051510).\n- spi: pxa2xx: Allow 64-bit DMA (bsc#1051510).\n- spi: pxa2xx: check clk_prepare_enable() return value (bsc#1051510).\n- sr: pass down correctly sized SCSI sense buffer (git-fixes).\n- staging: ks7010: Use constants from ieee80211_eid instead of literal ints (bsc#1051510).\n- staging: speakup: fix wraparound in uaccess length check (bsc#1051510).\n- supported.conf: add drivers/md/dm-writecache\n- sysrq : fix Show Regs call trace on ARM (bsc#1051510).\n- thermal: exynos: fix setting rising_threshold for Exynos5433 (bsc#1051510).\n- tty: Fix data race in tty_insert_flip_string_fixed_flag (bsc#1051510).\n- typec: tcpm: Fix a msecs vs jiffies bug (bsc#1100132).\n- udf: Detect incorrect directory size (bsc#1101891).\n- udf: Provide saner default for invalid uid / gid (bsc#1101890).\n- Update config files to add CONFIG_DM_WRITECACHE=m\n- Update patches.arch/KVM-PPC-Check-if-IOMMU-page-is-contained-in-the-pinn.patch (bsc#1077761, git-fixes, bsc#1103948, bsc#1103949).\n- usb: hub: Do not wait for connect state at resume for powered-off ports (bsc#1051510).\n- usbip: usbip_detach: Fix memory, udev context and udev leak (bsc#1051510).\n- vfs: add the sb_start_intwrite_trylock() helper (bsc#1101841).\n- virtio_balloon: fix another race between migration and ballooning (bsc#1051510).\n- wlcore: sdio: check for valid platform device data before suspend (bsc#1051510).\n- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).\n- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).\n- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).\n- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).\n- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- x86/KVM/VMX: Add module argument for L1TF mitigation.\n- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).\n- x86/topology: Provide topology_smt_supported() (bsc#1089343).\n- x86: Treat R_X86_64_PLT32 as R_X86_64_PC32 (binutils_2.31).\n- xfs: catch inode allocation state mismatch corruption (bsc#1104211).\n- xfs: prevent creating negative-sized file via INSERT_RANGE (bsc#1101833).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Basesystem-15-2018-1614,SUSE-SLE-Module-Development-Tools-15-2018-1614,SUSE-SLE-Module-Legacy-15-2018-1614,SUSE-SLE-Product-HA-15-2018-1614,SUSE-SLE-Product-WE-15-2018-1614", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2380-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2380-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182380-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2380-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004450.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1051979", "url": "https://bugzilla.suse.com/1051979" }, { "category": "self", "summary": "SUSE Bug 1066110", "url": "https://bugzilla.suse.com/1066110" }, { "category": "self", "summary": "SUSE Bug 1077761", "url": "https://bugzilla.suse.com/1077761" }, { "category": "self", "summary": "SUSE Bug 1086274", "url": "https://bugzilla.suse.com/1086274" }, { "category": "self", "summary": "SUSE Bug 1086314", "url": "https://bugzilla.suse.com/1086314" }, { "category": "self", "summary": "SUSE Bug 1087081", "url": "https://bugzilla.suse.com/1087081" }, { "category": "self", "summary": "SUSE Bug 1089343", "url": "https://bugzilla.suse.com/1089343" }, { "category": "self", "summary": "SUSE Bug 1099811", "url": "https://bugzilla.suse.com/1099811" }, { "category": "self", "summary": "SUSE Bug 1099813", "url": "https://bugzilla.suse.com/1099813" }, { "category": "self", "summary": "SUSE Bug 1099844", "url": "https://bugzilla.suse.com/1099844" }, { "category": "self", "summary": "SUSE Bug 1099845", "url": "https://bugzilla.suse.com/1099845" }, { "category": "self", "summary": "SUSE Bug 1099846", "url": "https://bugzilla.suse.com/1099846" }, { "category": "self", "summary": "SUSE Bug 1099849", "url": "https://bugzilla.suse.com/1099849" }, { "category": "self", "summary": "SUSE Bug 1099858", "url": "https://bugzilla.suse.com/1099858" }, { "category": "self", "summary": "SUSE Bug 1099863", "url": "https://bugzilla.suse.com/1099863" }, { "category": "self", "summary": "SUSE Bug 1099864", "url": "https://bugzilla.suse.com/1099864" }, { "category": "self", "summary": "SUSE Bug 1100132", "url": "https://bugzilla.suse.com/1100132" }, { "category": "self", "summary": "SUSE Bug 1101116", "url": "https://bugzilla.suse.com/1101116" }, { "category": "self", "summary": "SUSE Bug 1101331", "url": "https://bugzilla.suse.com/1101331" }, { "category": "self", "summary": "SUSE Bug 1101669", "url": "https://bugzilla.suse.com/1101669" }, { "category": "self", "summary": "SUSE Bug 1101828", "url": "https://bugzilla.suse.com/1101828" }, { "category": "self", "summary": "SUSE Bug 1101832", "url": "https://bugzilla.suse.com/1101832" }, { "category": "self", "summary": "SUSE Bug 1101833", "url": "https://bugzilla.suse.com/1101833" }, { "category": "self", "summary": "SUSE Bug 1101837", "url": "https://bugzilla.suse.com/1101837" }, { "category": "self", "summary": "SUSE Bug 1101839", "url": "https://bugzilla.suse.com/1101839" }, { "category": "self", "summary": "SUSE Bug 1101841", "url": "https://bugzilla.suse.com/1101841" }, { "category": "self", "summary": "SUSE Bug 1101843", "url": "https://bugzilla.suse.com/1101843" }, { "category": "self", "summary": "SUSE Bug 1101844", "url": "https://bugzilla.suse.com/1101844" }, { "category": "self", "summary": "SUSE Bug 1101845", "url": "https://bugzilla.suse.com/1101845" }, { "category": "self", "summary": "SUSE Bug 1101847", "url": "https://bugzilla.suse.com/1101847" }, { "category": "self", "summary": "SUSE Bug 1101852", "url": "https://bugzilla.suse.com/1101852" }, { "category": "self", "summary": "SUSE Bug 1101853", "url": "https://bugzilla.suse.com/1101853" }, { "category": "self", "summary": "SUSE Bug 1101867", "url": "https://bugzilla.suse.com/1101867" }, { "category": "self", "summary": "SUSE Bug 1101872", "url": "https://bugzilla.suse.com/1101872" }, { "category": "self", "summary": "SUSE Bug 1101874", "url": "https://bugzilla.suse.com/1101874" }, { "category": "self", "summary": "SUSE Bug 1101875", "url": "https://bugzilla.suse.com/1101875" }, { "category": "self", "summary": "SUSE Bug 1101882", "url": "https://bugzilla.suse.com/1101882" }, { "category": "self", "summary": "SUSE Bug 1101883", "url": "https://bugzilla.suse.com/1101883" }, { "category": "self", "summary": "SUSE Bug 1101885", "url": "https://bugzilla.suse.com/1101885" }, { "category": "self", "summary": "SUSE Bug 1101887", "url": "https://bugzilla.suse.com/1101887" }, { "category": "self", "summary": "SUSE Bug 1101890", "url": "https://bugzilla.suse.com/1101890" }, { "category": "self", "summary": "SUSE Bug 1101891", "url": "https://bugzilla.suse.com/1101891" }, { "category": "self", "summary": "SUSE Bug 1101893", "url": "https://bugzilla.suse.com/1101893" }, { "category": "self", "summary": "SUSE Bug 1101895", "url": "https://bugzilla.suse.com/1101895" }, { "category": "self", "summary": "SUSE Bug 1101896", "url": "https://bugzilla.suse.com/1101896" }, { "category": "self", "summary": "SUSE Bug 1101900", "url": "https://bugzilla.suse.com/1101900" }, { "category": "self", "summary": "SUSE Bug 1101902", "url": "https://bugzilla.suse.com/1101902" }, { "category": "self", "summary": "SUSE Bug 1101903", "url": "https://bugzilla.suse.com/1101903" }, { "category": "self", "summary": "SUSE Bug 1102633", "url": "https://bugzilla.suse.com/1102633" }, { "category": "self", "summary": "SUSE Bug 1102658", "url": "https://bugzilla.suse.com/1102658" }, { "category": "self", "summary": "SUSE Bug 1103097", "url": "https://bugzilla.suse.com/1103097" }, { "category": "self", "summary": "SUSE Bug 1103356", "url": "https://bugzilla.suse.com/1103356" }, { "category": "self", "summary": "SUSE Bug 1103421", "url": "https://bugzilla.suse.com/1103421" }, { "category": "self", "summary": "SUSE Bug 1103517", "url": "https://bugzilla.suse.com/1103517" }, { "category": "self", "summary": "SUSE Bug 1103723", "url": "https://bugzilla.suse.com/1103723" }, { "category": "self", "summary": "SUSE Bug 1103724", "url": "https://bugzilla.suse.com/1103724" }, { "category": "self", "summary": "SUSE Bug 1103725", "url": "https://bugzilla.suse.com/1103725" }, { "category": "self", "summary": "SUSE Bug 1103726", "url": "https://bugzilla.suse.com/1103726" }, { "category": "self", "summary": "SUSE Bug 1103727", "url": "https://bugzilla.suse.com/1103727" }, { "category": "self", "summary": "SUSE Bug 1103728", "url": "https://bugzilla.suse.com/1103728" }, { "category": "self", "summary": "SUSE Bug 1103729", "url": "https://bugzilla.suse.com/1103729" }, { "category": "self", "summary": "SUSE Bug 1103730", "url": "https://bugzilla.suse.com/1103730" }, { "category": "self", "summary": "SUSE Bug 1103917", "url": "https://bugzilla.suse.com/1103917" }, { "category": "self", "summary": "SUSE Bug 1103920", "url": "https://bugzilla.suse.com/1103920" }, { "category": "self", "summary": "SUSE Bug 1103948", "url": "https://bugzilla.suse.com/1103948" }, { "category": "self", "summary": "SUSE Bug 1103949", "url": "https://bugzilla.suse.com/1103949" }, { "category": "self", "summary": "SUSE Bug 1104066", "url": "https://bugzilla.suse.com/1104066" }, { "category": "self", "summary": "SUSE Bug 1104111", "url": "https://bugzilla.suse.com/1104111" }, { "category": "self", "summary": "SUSE Bug 1104174", "url": "https://bugzilla.suse.com/1104174" }, { "category": "self", "summary": "SUSE Bug 1104211", "url": "https://bugzilla.suse.com/1104211" }, { "category": "self", "summary": "SUSE Bug 1104319", "url": "https://bugzilla.suse.com/1104319" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10876 page", "url": "https://www.suse.com/security/cve/CVE-2018-10876/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10877 page", "url": "https://www.suse.com/security/cve/CVE-2018-10877/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10878 page", "url": "https://www.suse.com/security/cve/CVE-2018-10878/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10879 page", "url": "https://www.suse.com/security/cve/CVE-2018-10879/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10880 page", "url": "https://www.suse.com/security/cve/CVE-2018-10880/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10881 page", "url": "https://www.suse.com/security/cve/CVE-2018-10881/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10882 page", "url": "https://www.suse.com/security/cve/CVE-2018-10882/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10883 page", "url": "https://www.suse.com/security/cve/CVE-2018-10883/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3620 page", "url": "https://www.suse.com/security/cve/CVE-2018-3620/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5391 page", "url": "https://www.suse.com/security/cve/CVE-2018-5391/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-08-16T12:30:10Z", "generator": { "date": "2018-08-16T12:30:10Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2380-1", "initial_release_date": "2018-08-16T12:30:10Z", "revision_history": [ { "date": "2018-08-16T12:30:10Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-4.12.14-25.13.1.aarch64", "product": { "name": "kernel-default-4.12.14-25.13.1.aarch64", "product_id": "kernel-default-4.12.14-25.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-25.13.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-25.13.1.aarch64", "product_id": "kernel-default-devel-4.12.14-25.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-25.13.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-25.13.1.aarch64", "product_id": "kernel-obs-build-4.12.14-25.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-25.13.1.aarch64", "product": { "name": "kernel-syms-4.12.14-25.13.1.aarch64", "product_id": "kernel-syms-4.12.14-25.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-25.13.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-25.13.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-25.13.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "product": { "name": "reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "product_id": "reiserfs-kmp-default-4.12.14-25.13.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-25.13.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-25.13.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-25.13.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-25.13.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-25.13.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-25.13.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-25.13.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-25.13.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-25.13.1.noarch", "product": { "name": "kernel-devel-4.12.14-25.13.1.noarch", "product_id": "kernel-devel-4.12.14-25.13.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-25.13.1.noarch", "product": { "name": "kernel-macros-4.12.14-25.13.1.noarch", "product_id": "kernel-macros-4.12.14-25.13.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-25.13.1.noarch", "product": { "name": "kernel-docs-4.12.14-25.13.1.noarch", "product_id": "kernel-docs-4.12.14-25.13.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-25.13.1.noarch", "product": { "name": "kernel-source-4.12.14-25.13.1.noarch", "product_id": "kernel-source-4.12.14-25.13.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.12.14-25.13.1.ppc64le", "product": { "name": "kernel-default-4.12.14-25.13.1.ppc64le", "product_id": "kernel-default-4.12.14-25.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-25.13.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-25.13.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-25.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-25.13.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-25.13.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-25.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-25.13.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-25.13.1.ppc64le", "product_id": "kernel-syms-4.12.14-25.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-25.13.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "product": { "name": "reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "product_id": "reiserfs-kmp-default-4.12.14-25.13.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-25.13.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-25.13.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-25.13.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-25.13.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-25.13.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-25.13.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.12.14-25.13.1.s390x", "product": { "name": "kernel-default-4.12.14-25.13.1.s390x", "product_id": "kernel-default-4.12.14-25.13.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-25.13.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-25.13.1.s390x", "product_id": "kernel-default-devel-4.12.14-25.13.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-25.13.1.s390x", "product": { "name": "kernel-default-man-4.12.14-25.13.1.s390x", "product_id": "kernel-default-man-4.12.14-25.13.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-25.13.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-25.13.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-25.13.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-25.13.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-25.13.1.s390x", "product_id": "kernel-obs-build-4.12.14-25.13.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-25.13.1.s390x", "product": { "name": "kernel-syms-4.12.14-25.13.1.s390x", "product_id": "kernel-syms-4.12.14-25.13.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-25.13.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-25.13.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-25.13.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-25.13.1.s390x", "product": { "name": "reiserfs-kmp-default-4.12.14-25.13.1.s390x", "product_id": "reiserfs-kmp-default-4.12.14-25.13.1.s390x" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-25.13.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-25.13.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-25.13.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-25.13.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-25.13.1.s390x", "product_id": "dlm-kmp-default-4.12.14-25.13.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-25.13.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-25.13.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-25.13.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-25.13.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-25.13.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-25.13.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.12.14-25.13.1.x86_64", "product": { "name": "kernel-default-4.12.14-25.13.1.x86_64", "product_id": "kernel-default-4.12.14-25.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-25.13.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-25.13.1.x86_64", "product_id": "kernel-default-devel-4.12.14-25.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-25.13.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-25.13.1.x86_64", "product_id": "kernel-obs-build-4.12.14-25.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-25.13.1.x86_64", "product": { "name": "kernel-syms-4.12.14-25.13.1.x86_64", "product_id": "kernel-syms-4.12.14-25.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-25.13.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-25.13.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-25.13.1.x86_64" } }, { "category": "product_version", "name": "lttng-modules-2.10.0-5.4.2.x86_64", "product": { "name": "lttng-modules-2.10.0-5.4.2.x86_64", "product_id": "lttng-modules-2.10.0-5.4.2.x86_64" } }, { "category": "product_version", "name": "lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "product": { "name": "lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "product_id": "lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "product": { "name": "reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "product_id": "reiserfs-kmp-default-4.12.14-25.13.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-25.13.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-25.13.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-25.13.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-25.13.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-25.13.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-25.13.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-25.13.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-25.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-25.13.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-25.13.1.x86_64", "product_id": "kernel-default-extra-4.12.14-25.13.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 15", "product": { "name": "SUSE Linux Enterprise Workstation Extension 15", "product_id": "SUSE Linux Enterprise Workstation Extension 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-25.13.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64" }, "product_reference": "kernel-default-4.12.14-25.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-25.13.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-25.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-25.13.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x" }, "product_reference": "kernel-default-4.12.14-25.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-25.13.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64" }, "product_reference": "kernel-default-4.12.14-25.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-25.13.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-25.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-25.13.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-25.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-25.13.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-25.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-25.13.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-25.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-25.13.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-25.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-25.13.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch" }, "product_reference": "kernel-devel-4.12.14-25.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-25.13.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch" }, "product_reference": "kernel-macros-4.12.14-25.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-4.12.14-25.13.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x" }, "product_reference": "kernel-zfcpdump-4.12.14-25.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-25.13.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch" }, "product_reference": "kernel-docs-4.12.14-25.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-25.13.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-25.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-25.13.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-25.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-25.13.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-25.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-25.13.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-25.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-25.13.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch" }, "product_reference": "kernel-source-4.12.14-25.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-25.13.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-25.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-25.13.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-25.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-25.13.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x" }, "product_reference": "kernel-syms-4.12.14-25.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-25.13.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-25.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-25.13.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-25.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-25.13.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le" }, "product_reference": "kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-25.13.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x" }, "product_reference": "kernel-vanilla-base-4.12.14-25.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-25.13.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-25.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-2.10.0-5.4.2.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64" }, "product_reference": "lttng-modules-2.10.0-5.4.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64" }, "product_reference": "lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-25.13.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-25.13.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-25.13.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x" }, "product_reference": "reiserfs-kmp-default-4.12.14-25.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-25.13.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-25.13.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64" }, "product_reference": "cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-25.13.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-25.13.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-25.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-25.13.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-25.13.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64" }, "product_reference": "dlm-kmp-default-4.12.14-25.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-25.13.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-25.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-25.13.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-25.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-25.13.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-25.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-25.13.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64" }, "product_reference": "gfs2-kmp-default-4.12.14-25.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-25.13.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-25.13.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-25.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-25.13.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-25.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-25.13.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64" }, "product_reference": "ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-25.13.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-25.13.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-25.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-25.13.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-25.13.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15", "product_id": "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-25.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10876", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10876" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10876", "url": "https://www.suse.com/security/cve/CVE-2018-10876" }, { "category": "external", "summary": "SUSE Bug 1099811 for CVE-2018-10876", "url": "https://bugzilla.suse.com/1099811" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T12:30:10Z", "details": "moderate" } ], "title": "CVE-2018-10876" }, { "cve": "CVE-2018-10877", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10877" } ], "notes": [ { "category": "general", "text": "Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10877", "url": "https://www.suse.com/security/cve/CVE-2018-10877" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10877", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099846 for CVE-2018-10877", "url": "https://bugzilla.suse.com/1099846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T12:30:10Z", "details": "moderate" } ], "title": "CVE-2018-10877" }, { "cve": "CVE-2018-10878", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10878" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10878", "url": "https://www.suse.com/security/cve/CVE-2018-10878" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10878", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099813 for CVE-2018-10878", "url": "https://bugzilla.suse.com/1099813" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T12:30:10Z", "details": "moderate" } ], "title": "CVE-2018-10878" }, { "cve": "CVE-2018-10879", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10879" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10879", "url": "https://www.suse.com/security/cve/CVE-2018-10879" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10879", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099844 for CVE-2018-10879", "url": "https://bugzilla.suse.com/1099844" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T12:30:10Z", "details": "moderate" } ], "title": "CVE-2018-10879" }, { "cve": "CVE-2018-10880", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10880" } ], "notes": [ { "category": "general", "text": "Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10880", "url": "https://www.suse.com/security/cve/CVE-2018-10880" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10880", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099845 for CVE-2018-10880", "url": "https://bugzilla.suse.com/1099845" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T12:30:10Z", "details": "moderate" } ], "title": "CVE-2018-10880" }, { "cve": "CVE-2018-10881", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10881" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10881", "url": "https://www.suse.com/security/cve/CVE-2018-10881" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10881", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099864 for CVE-2018-10881", "url": "https://bugzilla.suse.com/1099864" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T12:30:10Z", "details": "moderate" } ], "title": "CVE-2018-10881" }, { "cve": "CVE-2018-10882", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10882" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10882", "url": "https://www.suse.com/security/cve/CVE-2018-10882" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10882", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099849 for CVE-2018-10882", "url": "https://bugzilla.suse.com/1099849" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T12:30:10Z", "details": "moderate" } ], "title": "CVE-2018-10882" }, { "cve": "CVE-2018-10883", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10883" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10883", "url": "https://www.suse.com/security/cve/CVE-2018-10883" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10883", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099863 for CVE-2018-10883", "url": "https://bugzilla.suse.com/1099863" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T12:30:10Z", "details": "moderate" } ], "title": "CVE-2018-10883" }, { "cve": "CVE-2018-3620", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3620" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3620", "url": "https://www.suse.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1090340 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1090340" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T12:30:10Z", "details": "moderate" } ], "title": "CVE-2018-3620" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T12:30:10Z", "details": "important" } ], "title": "CVE-2018-3646" }, { "cve": "CVE-2018-5391", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5391" } ], "notes": [ { "category": "general", "text": "The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5391", "url": "https://www.suse.com/security/cve/CVE-2018-5391" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1108654 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1108654" }, { "category": "external", "summary": "SUSE Bug 1114071 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1114071" }, { "category": "external", "summary": "SUSE Bug 1121102 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1121102" }, { "category": "external", "summary": "SUSE Bug 1134140 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1134140" }, { "category": "external", "summary": "SUSE Bug 1181460 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1181460" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.13.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-2.10.0-5.4.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:lttng-modules-kmp-default-2.10.0_k4.12.14_25.13-5.4.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T12:30:10Z", "details": "moderate" } ], "title": "CVE-2018-5391" } ] }
suse-su-2018:2394-1
Vulnerability from csaf_suse
Published
2018-08-16 13:46
Modified
2018-08-16 13:46
Summary
Security update for kgraft
Notes
Title of the patch
Security update for kgraft
Description of the patch
This update for kgraft fixes the following issues:
Add script for disabling SMT to help with the mitigation of the 'L1 Terminal Fault' issue (CVE-2018-3646 bsc#1099306)
The script is called 'klp-kvm-l1tf-ctrl-smt' and is used for enabling or disabling SMT to mitigate
the issue when this administrative decision is taken.
Disabling SMT:
klp-kvm-l1tf-ctrl-smt -d
Enabling SMT:
klp-kvm-l1tf-ctrl-smt -e
Patchnames
SUSE-SLE-Live-Patching-12-2018-1637,SUSE-SLE-Live-Patching-12-SP3-2018-1637
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kgraft", "title": "Title of the patch" }, { "category": "description", "text": "This update for kgraft fixes the following issues:\n\nAdd script for disabling SMT to help with the mitigation of the \u0027L1 Terminal Fault\u0027 issue (CVE-2018-3646 bsc#1099306)\n\nThe script is called \u0027klp-kvm-l1tf-ctrl-smt\u0027 and is used for enabling or disabling SMT to mitigate\nthe issue when this administrative decision is taken.\n\nDisabling SMT:\n\n\tklp-kvm-l1tf-ctrl-smt -d\n\nEnabling SMT:\n\n\tklp-kvm-l1tf-ctrl-smt -e\n\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2018-1637,SUSE-SLE-Live-Patching-12-SP3-2018-1637", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2394-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2394-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182394-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2394-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004460.html" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for kgraft", "tracking": { "current_release_date": "2018-08-16T13:46:00Z", "generator": { "date": "2018-08-16T13:46:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2394-1", "initial_release_date": "2018-08-16T13:46:00Z", "revision_history": [ { "date": "2018-08-16T13:46:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-1.0-23.9.1.ppc64le", "product": { "name": "kgraft-1.0-23.9.1.ppc64le", "product_id": "kgraft-1.0-23.9.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-1.0-23.9.1.s390x", "product": { "name": "kgraft-1.0-23.9.1.s390x", "product_id": "kgraft-1.0-23.9.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kgraft-1.0-23.9.1.x86_64", "product": { "name": "kgraft-1.0-23.9.1.x86_64", "product_id": "kgraft-1.0-23.9.1.x86_64" } }, { "category": "product_version", "name": "kgraft-devel-1.0-23.9.1.x86_64", "product": { "name": "kgraft-devel-1.0-23.9.1.x86_64", "product_id": "kgraft-devel-1.0-23.9.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-1.0-23.9.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-1.0-23.9.1.ppc64le" }, "product_reference": "kgraft-1.0-23.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-1.0-23.9.1.s390x as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-1.0-23.9.1.s390x" }, "product_reference": "kgraft-1.0-23.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-1.0-23.9.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-1.0-23.9.1.x86_64" }, "product_reference": "kgraft-1.0-23.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-devel-1.0-23.9.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-devel-1.0-23.9.1.x86_64" }, "product_reference": "kgraft-devel-1.0-23.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-1.0-23.9.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-1.0-23.9.1.ppc64le" }, "product_reference": "kgraft-1.0-23.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-1.0-23.9.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-1.0-23.9.1.x86_64" }, "product_reference": "kgraft-1.0-23.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-1.0-23.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-1.0-23.9.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-1.0-23.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 12:kgraft-1.0-23.9.1.s390x", "SUSE Linux Enterprise Live Patching 12:kgraft-1.0-23.9.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-devel-1.0-23.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-1.0-23.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-1.0-23.9.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-1.0-23.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 12:kgraft-1.0-23.9.1.s390x", "SUSE Linux Enterprise Live Patching 12:kgraft-1.0-23.9.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-devel-1.0-23.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-1.0-23.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-1.0-23.9.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-1.0-23.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 12:kgraft-1.0-23.9.1.s390x", "SUSE Linux Enterprise Live Patching 12:kgraft-1.0-23.9.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-devel-1.0-23.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T13:46:00Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2344-2
Vulnerability from csaf_suse
Published
2018-10-18 12:49
Modified
2018-10-18 12:49
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).
- CVE-2018-5390 aka 'SegmentSmack': The Linux Kernel can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bnc#1102340).
- CVE-2018-5391 aka 'FragmentSmack': A flaw in the IP packet reassembly could be used by remote attackers to consume lots of CPU time (bnc#1103097).
- CVE-2018-14734: drivers/infiniband/core/ucma.c allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).
- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn't properly validate the sigevent->sigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bnc#1102851 bnc#1103580).
- CVE-2018-9385: When printing the 'driver_override' option from with-in the amba driver, a very long line could expose one additional uninitialized byte (bnc#1100491).
- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).
- CVE-2018-13405: The inode_init_owner function in fs/inode.c allowed local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID (bnc#1100416).
- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 1100418).
- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations could be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).
The following non-security bugs were fixed:
- Add support for 5,25,50, and 100G to 802.3ad bonding driver (bsc#1096978)
- bcache: add backing_request_endio() for bi_end_io (bsc#1064232).
- bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1064232).
- bcache: add io_disable to struct cached_dev (bsc#1064232).
- bcache: add journal statistic (bsc#1076110).
- bcache: Add __printf annotation to __bch_check_keys() (bsc#1064232).
- bcache: add stop_when_cache_set_failed option to backing device (bsc#1064232).
- bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1064232).
- bcache: Annotate switch fall-through (bsc#1064232).
- bcache: closures: move control bits one bit right (bsc#1076110).
- bcache: correct flash only vols (check all uuids) (bsc#1064232).
- bcache: count backing device I/O error for writeback I/O (bsc#1064232).
- bcache: do not attach backing with duplicate UUID (bsc#1076110).
- bcache: Fix a compiler warning in bcache_device_init() (bsc#1064232).
- bcache: fix cached_dev->count usage for bch_cache_set_error() (bsc#1064232).
- bcache: fix crashes in duplicate cache device register (bsc#1076110).
- bcache: fix error return value in memory shrink (bsc#1064232).
- bcache: fix for allocator and register thread race (bsc#1076110).
- bcache: fix for data collapse after re-attaching an attached device (bsc#1076110).
- bcache: fix high CPU occupancy during journal (bsc#1076110).
- bcache: Fix, improve efficiency of closure_sync() (bsc#1076110).
- bcache: fix inaccurate io state for detached bcache devices (bsc#1064232).
- bcache: fix incorrect sysfs output value of strip size (bsc#1064232).
- bcache: Fix indentation (bsc#1064232).
- bcache: fix kcrashes with fio in RAID5 backend dev (bsc#1076110).
- bcache: Fix kernel-doc warnings (bsc#1064232).
- bcache: fix misleading error message in bch_count_io_errors() (bsc#1064232).
- bcache: fix using of loop variable in memory shrink (bsc#1064232).
- bcache: fix writeback target calc on large devices (bsc#1076110).
- bcache: fix wrong return value in bch_debug_init() (bsc#1076110).
- bcache: mark closure_sync() __sched (bsc#1076110).
- bcache: move closure debug file into debug directory (bsc#1064232).
- bcache: properly set task state in bch_writeback_thread() (bsc#1064232).
- bcache: quit dc->writeback_thread when BCACHE_DEV_DETACHING is set (bsc#1064232).
- bcache: reduce cache_set devices iteration by devices_max_used (bsc#1064232).
- bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1064232).
- bcache: Remove an unused variable (bsc#1064232).
- bcache: ret IOERR when read meets metadata error (bsc#1076110).
- bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1064232).
- bcache: return attach error when no cache set exist (bsc#1076110).
- bcache: segregate flash only volume write streams (bsc#1076110).
- bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1064232).
- bcache: set dc->io_disable to true in conditional_stop_bcache_device() (bsc#1064232).
- bcache: set error_limit correctly (bsc#1064232).
- bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1064232).
- bcache: stop bcache device when backing device is offline (bsc#1064232).
- bcache: stop dc->writeback_rate_update properly (bsc#1064232).
- bcache: stop writeback thread after detaching (bsc#1076110).
- bcache: store disk name in struct cache and struct cached_dev (bsc#1064232).
- bcache: Suppress more warnings about set-but-not-used variables (bsc#1064232).
- bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1064232).
- bcache: Use PTR_ERR_OR_ZERO() (bsc#1076110).
- bpf: properly enforce index mask to prevent out-of-bounds speculation (bsc#1098425).
- cifs: Check for timeout on Negotiate stage (bsc#1091171).
- cifs: fix bad/NULL ptr dereferencing in SMB2_sess_setup() (bsc#1090123).
- cpu/hotplug: Add sysfs state interface (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- ext4: fix unsupported feature message formatting (bsc#1098435).
- Hang/soft lockup in d_invalidate with simultaneous calls (bsc#1094248, bsc@1097140).
- ixgbe: fix possible race in reset subtask (bsc#1101557).
- ixgbe: Refactor queue disable logic to take completion time into account (bsc#1101557).
- ixgbe: Reorder Tx/Rx shutdown to reduce time needed to stop device (bsc#1101557).
- ixgbe: use atomic bitwise operations when handling reset requests (bsc#1101557).
- kabi/severities: add PASS to drivers/md/bcache/*, no one uses bcache kernel module.
- procfs: add tunable for fd/fdinfo dentry retention (bsc#1086652).
- sched/sysctl: Check user input value of sysctl_sched_time_avg (bsc#1100089).
- signals: avoid unnecessary taking of sighand->siglock (bsc#1096130).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343). Update config files.
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/mm: Simplify p[g4um]d_page() macros (1087081).
- x86/pti: do not report XenPV as vulnerable (bsc#1097551).
- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/topology: Add topology_max_smt_threads() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- xen/grant-table: log the lack of grants (bnc#1085042).
Patchnames
SUSE-SLE-SERVER-12-SP2-BCL-2018-1603
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).\n- CVE-2018-5390 aka \u0027SegmentSmack\u0027: The Linux Kernel can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bnc#1102340).\n- CVE-2018-5391 aka \u0027FragmentSmack\u0027: A flaw in the IP packet reassembly could be used by remote attackers to consume lots of CPU time (bnc#1103097).\n- CVE-2018-14734: drivers/infiniband/core/ucma.c allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).\n- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bnc#1102851 bnc#1103580).\n- CVE-2018-9385: When printing the \u0027driver_override\u0027 option from with-in the amba driver, a very long line could expose one additional uninitialized byte (bnc#1100491).\n- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).\n- CVE-2018-13405: The inode_init_owner function in fs/inode.c allowed local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID (bnc#1100416).\n- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 1100418).\n- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations could be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).\n\nThe following non-security bugs were fixed:\n\n- Add support for 5,25,50, and 100G to 802.3ad bonding driver (bsc#1096978)\n- bcache: add backing_request_endio() for bi_end_io (bsc#1064232).\n- bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1064232).\n- bcache: add io_disable to struct cached_dev (bsc#1064232).\n- bcache: add journal statistic (bsc#1076110).\n- bcache: Add __printf annotation to __bch_check_keys() (bsc#1064232).\n- bcache: add stop_when_cache_set_failed option to backing device (bsc#1064232).\n- bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1064232).\n- bcache: Annotate switch fall-through (bsc#1064232).\n- bcache: closures: move control bits one bit right (bsc#1076110).\n- bcache: correct flash only vols (check all uuids) (bsc#1064232).\n- bcache: count backing device I/O error for writeback I/O (bsc#1064232).\n- bcache: do not attach backing with duplicate UUID (bsc#1076110).\n- bcache: Fix a compiler warning in bcache_device_init() (bsc#1064232).\n- bcache: fix cached_dev-\u003ecount usage for bch_cache_set_error() (bsc#1064232).\n- bcache: fix crashes in duplicate cache device register (bsc#1076110).\n- bcache: fix error return value in memory shrink (bsc#1064232).\n- bcache: fix for allocator and register thread race (bsc#1076110).\n- bcache: fix for data collapse after re-attaching an attached device (bsc#1076110).\n- bcache: fix high CPU occupancy during journal (bsc#1076110).\n- bcache: Fix, improve efficiency of closure_sync() (bsc#1076110).\n- bcache: fix inaccurate io state for detached bcache devices (bsc#1064232).\n- bcache: fix incorrect sysfs output value of strip size (bsc#1064232).\n- bcache: Fix indentation (bsc#1064232).\n- bcache: fix kcrashes with fio in RAID5 backend dev (bsc#1076110).\n- bcache: Fix kernel-doc warnings (bsc#1064232).\n- bcache: fix misleading error message in bch_count_io_errors() (bsc#1064232).\n- bcache: fix using of loop variable in memory shrink (bsc#1064232).\n- bcache: fix writeback target calc on large devices (bsc#1076110).\n- bcache: fix wrong return value in bch_debug_init() (bsc#1076110).\n- bcache: mark closure_sync() __sched (bsc#1076110).\n- bcache: move closure debug file into debug directory (bsc#1064232).\n- bcache: properly set task state in bch_writeback_thread() (bsc#1064232).\n- bcache: quit dc-\u003ewriteback_thread when BCACHE_DEV_DETACHING is set (bsc#1064232).\n- bcache: reduce cache_set devices iteration by devices_max_used (bsc#1064232).\n- bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1064232).\n- bcache: Remove an unused variable (bsc#1064232).\n- bcache: ret IOERR when read meets metadata error (bsc#1076110).\n- bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1064232).\n- bcache: return attach error when no cache set exist (bsc#1076110).\n- bcache: segregate flash only volume write streams (bsc#1076110).\n- bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1064232).\n- bcache: set dc-\u003eio_disable to true in conditional_stop_bcache_device() (bsc#1064232).\n- bcache: set error_limit correctly (bsc#1064232).\n- bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1064232).\n- bcache: stop bcache device when backing device is offline (bsc#1064232).\n- bcache: stop dc-\u003ewriteback_rate_update properly (bsc#1064232).\n- bcache: stop writeback thread after detaching (bsc#1076110).\n- bcache: store disk name in struct cache and struct cached_dev (bsc#1064232).\n- bcache: Suppress more warnings about set-but-not-used variables (bsc#1064232).\n- bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1064232).\n- bcache: Use PTR_ERR_OR_ZERO() (bsc#1076110).\n- bpf: properly enforce index mask to prevent out-of-bounds speculation (bsc#1098425).\n- cifs: Check for timeout on Negotiate stage (bsc#1091171).\n- cifs: fix bad/NULL ptr dereferencing in SMB2_sess_setup() (bsc#1090123).\n- cpu/hotplug: Add sysfs state interface (bsc#1089343).\n- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).\n- cpu/hotplug: Split do_cpu_down() (bsc#1089343).\n- ext4: fix unsupported feature message formatting (bsc#1098435).\n- Hang/soft lockup in d_invalidate with simultaneous calls (bsc#1094248, bsc@1097140).\n- ixgbe: fix possible race in reset subtask (bsc#1101557).\n- ixgbe: Refactor queue disable logic to take completion time into account (bsc#1101557).\n- ixgbe: Reorder Tx/Rx shutdown to reduce time needed to stop device (bsc#1101557).\n- ixgbe: use atomic bitwise operations when handling reset requests (bsc#1101557).\n- kabi/severities: add PASS to drivers/md/bcache/*, no one uses bcache kernel module.\n- procfs: add tunable for fd/fdinfo dentry retention (bsc#1086652).\n- sched/sysctl: Check user input value of sysctl_sched_time_avg (bsc#1100089).\n- signals: avoid unnecessary taking of sighand-\u003esiglock (bsc#1096130).\n- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).\n- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343). Update config files.\n- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).\n- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- x86/mm: Simplify p[g4um]d_page() macros (1087081).\n- x86/pti: do not report XenPV as vulnerable (bsc#1097551).\n- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).\n- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).\n- x86/topology: Add topology_max_smt_threads() (bsc#1089343).\n- x86/topology: Provide topology_smt_supported() (bsc#1089343).\n- xen/grant-table: log the lack of grants (bnc#1085042).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-SP2-BCL-2018-1603", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2344-2.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2344-2", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182344-2/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2344-2", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" }, { "category": "self", "summary": "SUSE Bug 1064232", "url": "https://bugzilla.suse.com/1064232" }, { "category": "self", "summary": "SUSE Bug 1076110", "url": "https://bugzilla.suse.com/1076110" }, { "category": "self", "summary": "SUSE Bug 1083635", "url": "https://bugzilla.suse.com/1083635" }, { "category": "self", "summary": "SUSE Bug 1085042", "url": "https://bugzilla.suse.com/1085042" }, { "category": "self", "summary": "SUSE Bug 1086652", "url": "https://bugzilla.suse.com/1086652" }, { "category": "self", "summary": "SUSE Bug 1087081", "url": "https://bugzilla.suse.com/1087081" }, { "category": "self", "summary": "SUSE Bug 1089343", "url": "https://bugzilla.suse.com/1089343" }, { "category": "self", "summary": "SUSE Bug 1090123", "url": "https://bugzilla.suse.com/1090123" }, { "category": "self", "summary": "SUSE Bug 1091171", "url": "https://bugzilla.suse.com/1091171" }, { "category": "self", "summary": "SUSE Bug 1094248", "url": "https://bugzilla.suse.com/1094248" }, { "category": "self", "summary": "SUSE Bug 1096130", "url": "https://bugzilla.suse.com/1096130" }, { "category": "self", "summary": "SUSE Bug 1096480", "url": "https://bugzilla.suse.com/1096480" }, { "category": "self", "summary": "SUSE Bug 1096978", "url": "https://bugzilla.suse.com/1096978" }, { "category": "self", "summary": "SUSE Bug 1097140", "url": "https://bugzilla.suse.com/1097140" }, { "category": "self", "summary": "SUSE Bug 1097551", "url": "https://bugzilla.suse.com/1097551" }, { "category": "self", "summary": "SUSE Bug 1098016", "url": "https://bugzilla.suse.com/1098016" }, { "category": "self", "summary": "SUSE Bug 1098425", "url": "https://bugzilla.suse.com/1098425" }, { "category": "self", "summary": "SUSE Bug 1098435", "url": "https://bugzilla.suse.com/1098435" }, { "category": "self", "summary": "SUSE Bug 1099924", "url": "https://bugzilla.suse.com/1099924" }, { "category": "self", "summary": "SUSE Bug 1100089", "url": "https://bugzilla.suse.com/1100089" }, { "category": "self", "summary": "SUSE Bug 1100416", "url": "https://bugzilla.suse.com/1100416" }, { "category": "self", "summary": "SUSE Bug 1100418", "url": "https://bugzilla.suse.com/1100418" }, { "category": "self", "summary": "SUSE Bug 1100491", "url": "https://bugzilla.suse.com/1100491" }, { "category": "self", "summary": "SUSE Bug 1101557", "url": "https://bugzilla.suse.com/1101557" }, { "category": "self", "summary": "SUSE Bug 1102340", "url": "https://bugzilla.suse.com/1102340" }, { "category": "self", "summary": "SUSE Bug 1102851", "url": "https://bugzilla.suse.com/1102851" }, { "category": "self", "summary": "SUSE Bug 1103097", "url": "https://bugzilla.suse.com/1103097" }, { "category": "self", "summary": "SUSE Bug 1103119", "url": "https://bugzilla.suse.com/1103119" }, { "category": "self", "summary": "SUSE Bug 1103580", "url": "https://bugzilla.suse.com/1103580" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18344 page", "url": "https://www.suse.com/security/cve/CVE-2017-18344/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13053 page", "url": "https://www.suse.com/security/cve/CVE-2018-13053/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13405 page", "url": "https://www.suse.com/security/cve/CVE-2018-13405/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13406 page", "url": "https://www.suse.com/security/cve/CVE-2018-13406/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14734 page", "url": "https://www.suse.com/security/cve/CVE-2018-14734/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3620 page", "url": "https://www.suse.com/security/cve/CVE-2018-3620/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5391 page", "url": "https://www.suse.com/security/cve/CVE-2018-5391/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5814 page", "url": "https://www.suse.com/security/cve/CVE-2018-5814/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-9385 page", "url": "https://www.suse.com/security/cve/CVE-2018-9385/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-10-18T12:49:01Z", "generator": { "date": "2018-10-18T12:49:01Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2344-2", "initial_release_date": "2018-10-18T12:49:01Z", "revision_history": [ { "date": "2018-10-18T12:49:01Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.121-92.92.1.noarch", "product": { "name": "kernel-devel-4.4.121-92.92.1.noarch", "product_id": "kernel-devel-4.4.121-92.92.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.121-92.92.1.noarch", "product": { "name": "kernel-macros-4.4.121-92.92.1.noarch", "product_id": "kernel-macros-4.4.121-92.92.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.121-92.92.1.noarch", "product": { "name": "kernel-source-4.4.121-92.92.1.noarch", "product_id": "kernel-source-4.4.121-92.92.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.4.121-92.92.1.x86_64", "product": { "name": "kernel-default-4.4.121-92.92.1.x86_64", "product_id": "kernel-default-4.4.121-92.92.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.92.1.x86_64", "product": { "name": "kernel-default-base-4.4.121-92.92.1.x86_64", "product_id": "kernel-default-base-4.4.121-92.92.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.92.1.x86_64", "product": { "name": "kernel-default-devel-4.4.121-92.92.1.x86_64", "product_id": "kernel-default-devel-4.4.121-92.92.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.92.1.x86_64", "product": { "name": "kernel-syms-4.4.121-92.92.1.x86_64", "product_id": "kernel-syms-4.4.121-92.92.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "product_id": "kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64" } }, { "category": "product_version", "name": "lttng-modules-2.7.1-9.4.1.x86_64", "product": { "name": "lttng-modules-2.7.1-9.4.1.x86_64", "product_id": "lttng-modules-2.7.1-9.4.1.x86_64" } }, { "category": "product_version", "name": "lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "product": { "name": "lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "product_id": "lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.92.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.92.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.92.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.92.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.92.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.92.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.92.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-2.7.1-9.4.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64" }, "product_reference": "lttng-modules-2.7.1-9.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" }, "product_reference": "lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-18344", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18344" } ], "notes": [ { "category": "general", "text": "The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18344", "url": "https://www.suse.com/security/cve/CVE-2017-18344" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102851 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1102851" }, { "category": "external", "summary": "SUSE Bug 1103203 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103203" }, { "category": "external", "summary": "SUSE Bug 1103580 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103580" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:49:01Z", "details": "moderate" } ], "title": "CVE-2017-18344" }, { "cve": "CVE-2018-13053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13053" } ], "notes": [ { "category": "general", "text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13053", "url": "https://www.suse.com/security/cve/CVE-2018-13053" }, { "category": "external", "summary": "SUSE Bug 1099924 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1099924" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:49:01Z", "details": "low" } ], "title": "CVE-2018-13053" }, { "cve": "CVE-2018-13405", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13405" } ], "notes": [ { "category": "general", "text": "The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13405", "url": "https://www.suse.com/security/cve/CVE-2018-13405" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1100416 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1100416" }, { "category": "external", "summary": "SUSE Bug 1129735 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1129735" }, { "category": "external", "summary": "SUSE Bug 1195161 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1195161" }, { "category": "external", "summary": "SUSE Bug 1198702 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1198702" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:49:01Z", "details": "moderate" } ], "title": "CVE-2018-13405" }, { "cve": "CVE-2018-13406", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13406" } ], "notes": [ { "category": "general", "text": "An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c in the Linux kernel before 4.17.4 could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13406", "url": "https://www.suse.com/security/cve/CVE-2018-13406" }, { "category": "external", "summary": "SUSE Bug 1098016 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1098016" }, { "category": "external", "summary": "SUSE Bug 1100418 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1100418" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:49:01Z", "details": "moderate" } ], "title": "CVE-2018-13406" }, { "cve": "CVE-2018-14734", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14734" } ], "notes": [ { "category": "general", "text": "drivers/infiniband/core/ucma.c in the Linux kernel through 4.17.11 allows ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14734", "url": "https://www.suse.com/security/cve/CVE-2018-14734" }, { "category": "external", "summary": "SUSE Bug 1103119 for CVE-2018-14734", "url": "https://bugzilla.suse.com/1103119" }, { "category": "external", "summary": "SUSE Bug 1131390 for CVE-2018-14734", "url": "https://bugzilla.suse.com/1131390" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:49:01Z", "details": "low" } ], "title": "CVE-2018-14734" }, { "cve": "CVE-2018-3620", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3620" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3620", "url": "https://www.suse.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1090340 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1090340" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:49:01Z", "details": "moderate" } ], "title": "CVE-2018-3620" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:49:01Z", "details": "important" } ], "title": "CVE-2018-3646" }, { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:49:01Z", "details": "moderate" } ], "title": "CVE-2018-5390" }, { "cve": "CVE-2018-5391", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5391" } ], "notes": [ { "category": "general", "text": "The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5391", "url": "https://www.suse.com/security/cve/CVE-2018-5391" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1108654 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1108654" }, { "category": "external", "summary": "SUSE Bug 1114071 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1114071" }, { "category": "external", "summary": "SUSE Bug 1121102 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1121102" }, { "category": "external", "summary": "SUSE Bug 1134140 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1134140" }, { "category": "external", "summary": "SUSE Bug 1181460 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1181460" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:49:01Z", "details": "moderate" } ], "title": "CVE-2018-5391" }, { "cve": "CVE-2018-5814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5814" } ], "notes": [ { "category": "general", "text": "In the Linux Kernel before version 4.16.11, 4.14.43, 4.9.102, and 4.4.133, multiple race condition errors when handling probe, disconnect, and rebind operations can be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5814", "url": "https://www.suse.com/security/cve/CVE-2018-5814" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5814", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1096480 for CVE-2018-5814", "url": "https://bugzilla.suse.com/1096480" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2018-5814", "url": "https://bugzilla.suse.com/1133319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:49:01Z", "details": "moderate" } ], "title": "CVE-2018-5814" }, { "cve": "CVE-2018-9385", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-9385" } ], "notes": [ { "category": "general", "text": "In driver_override_store of bus.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-74128061 References: Upstream kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-9385", "url": "https://www.suse.com/security/cve/CVE-2018-9385" }, { "category": "external", "summary": "SUSE Bug 1100491 for CVE-2018-9385", "url": "https://bugzilla.suse.com/1100491" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:49:01Z", "details": "moderate" } ], "title": "CVE-2018-9385" } ] }
suse-su-2018:2328-1
Vulnerability from csaf_suse
Published
2018-08-14 17:02
Modified
2018-08-14 17:02
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.143 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-5390 aka 'SegmentSmack': Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bnc#1102340).
- CVE-2018-14734: drivers/infiniband/core/ucma.c in the Linux kernel allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).
- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn't properly validate the sigevent->sigev_notify field, which lead to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bnc#1102851 bnc#1103580).
- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).
The following non-security bugs were fixed:
- Add support for 5,25,50, and 100G to 802.3ad bonding driver (bsc#1096978)
- ahci: Disable LPM on Lenovo 50 series laptops with a too old BIOS (bnc#1012382).
- arm64: do not open code page table entry creation (bsc#1102197).
- arm64: kpti: Use early_param for kpti= command-line option (bsc#1102188).
- arm64: Make sure permission updates happen for pmd/pud (bsc#1102197).
- atm: zatm: Fix potential Spectre v1 (bnc#1012382).
- bcm63xx_enet: correct clock usage (bnc#1012382).
- bcm63xx_enet: do not write to random DMA channel on BCM6345 (bnc#1012382).
- blacklist 9fb8d5dc4b64 ('stop_machine: Disable preemption when waking two stopper threads') Preemption is already disabled inside cpu_stop_queue_two_works() in SLE12-SP3 because it does not have commit 6a19005157c4 ('stop_machine: Do not disable preemption in stop_two_cpus()')
- block: copy ioprio in __bio_clone_fast() (bsc#1082653).
- bpf: fix loading of BPF_MAXINSNS sized programs (bsc#1012382).
- bpf, x64: fix memleak when not converging after image (bsc#1012382).
- cachefiles: Fix missing clear of the CACHEFILES_OBJECT_ACTIVE flag (bsc#1099858).
- cachefiles: Fix refcounting bug in backing-file read monitoring (bsc#1099858).
- cachefiles: Wait rather than BUG'ing on 'Unexpected object collision' (bsc#1099858).
- cifs: fix bad/NULL ptr dereferencing in SMB2_sess_setup() (bsc#1090123).
- compiler, clang: always inline when CONFIG_OPTIMIZE_INLINING is disabled (bnc#1012382).
- compiler, clang: properly override 'inline' for clang (bnc#1012382).
- compiler, clang: suppress warning for unused static inline functions (bnc#1012382).
- compiler-gcc.h: Add __attribute__((gnu_inline)) to all inline declarations (bnc#1012382).
- cpu/hotplug: Add sysfs state interface (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- crypto: crypto4xx - fix crypto4xx_build_pdr, crypto4xx_build_sdr leak (bnc#1012382).
- crypto: crypto4xx - remove bad list_del (bnc#1012382).
- drm/msm: Fix possible null dereference on failure of get_pages() (bsc#1102394).
- drm: re-enable error handling (bsc#1103884).
- fscache: Allow cancelled operations to be enqueued (bsc#1099858).
- fscache: Fix reference overput in fscache_attach_object() error handling (bsc#1099858).
- hid: usbhid: add quirk for innomedia INNEX GENESIS/ATARI adapter (bnc#1012382).
- ibmasm: do not write out of bounds in read handler (bnc#1012382).
- ibmvnic: Fix error recovery on login failure (bsc#1101789).
- iw_cxgb4: correctly enforce the max reg_mr depth (bnc#1012382).
- kabi protect includes in include/linux/inet.h (bsc#1095643).
- KABI protect net/core/utils.c includes (bsc#1095643).
- kABI: protect struct loop_device (kabi).
- kABI: reintroduce __static_cpu_has_safe (kabi).
- kbuild: fix # escaping in .cmd files for future Make (bnc#1012382).
- keys: DNS: fix parsing multiple options (bnc#1012382).
- kvm: arm/arm64: Drop resource size check for GICV window (bsc#1102215).
- kvm: arm/arm64: Set dist->spis to NULL after kfree (bsc#1102214).
- loop: add recursion validation to LOOP_CHANGE_FD (bnc#1012382).
- loop: remember whether sysfs_create_group() was done (bnc#1012382).
- mmc: dw_mmc: fix card threshold control configuration (bsc#1102203).
- mm: check VMA flags to avoid invalid PROT_NONE NUMA balancing (bsc#1097771).
- net: cxgb3_main: fix potential Spectre v1 (bnc#1012382).
- net: dccp: avoid crash in ccid3_hc_rx_send_feedback() (bnc#1012382).
- net: dccp: switch rx_tstamp_last_feedback to monotonic clock (bnc#1012382).
- netfilter: ebtables: reject non-bridge targets (bnc#1012382).
- netfilter: nf_queue: augment nfqa_cfg_policy (bnc#1012382).
- netfilter: x_tables: initialise match/target check parameter struct (bnc#1012382).
- net/mlx5: Fix command interface race in polling mode (bnc#1012382).
- net/mlx5: Fix incorrect raw command length parsing (bnc#1012382).
- net: mvneta: fix the Rx desc DMA address in the Rx path (bsc#1102207).
- net/nfc: Avoid stalls when nfc_alloc_send_skb() returned NULL (bnc#1012382).
- net: off by one in inet6_pton() (bsc#1095643).
- net: phy: marvell: Use strlcpy() for ethtool::get_strings (bsc#1102205).
- net_sched: blackhole: tell upper qdisc about dropped packets (bnc#1012382).
- net: sungem: fix rx checksum support (bnc#1012382).
- net/utils: generic inet_pton_with_scope helper (bsc#1095643).
- nvme-rdma: Check remotely invalidated rkey matches our expected rkey (bsc#1092001).
- nvme-rdma: default MR page size to 4k (bsc#1092001).
- nvme-rdma: do not complete requests before a send work request has completed (bsc#1092001).
- nvme-rdma: do not suppress send completions (bsc#1092001).
- nvme-rdma: Fix command completion race at error recovery (bsc#1090435).
- nvme-rdma: make nvme_rdma_[create|destroy]_queue_ib symmetrical (bsc#1092001).
- nvme-rdma: use inet_pton_with_scope helper (bsc#1095643).
- nvme-rdma: Use mr pool (bsc#1092001).
- nvme-rdma: wait for local invalidation before completing a request (bsc#1092001).
- ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent (bnc#1012382).
- pci: ibmphp: Fix use-before-set in get_max_bus_speed() (bsc#1100132).
- perf tools: Move syscall number fallbacks from perf-sys.h to tools/arch/x86/include/asm/ (bnc#1012382).
- pm / hibernate: Fix oops at snapshot_write() (bnc#1012382).
- powerpc/64: Initialise thread_info for emergency stacks (bsc#1094244, bsc#1100930, bsc#1102683).
- qed: Limit msix vectors in kdump kernel to the minimum required count (bnc#1012382).
- r8152: napi hangup fix after disconnect (bnc#1012382).
- rdma/ucm: Mark UCM interface as BROKEN (bnc#1012382).
- rds: avoid unenecessary cong_update in loop transport (bnc#1012382).
- Revert 'sit: reload iphdr in ipip6_rcv' (bnc#1012382).
- Revert 'x86/cpufeature: Move some of the scattered feature bits to x86_capability' (kabi).
- Revert 'x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6' (kabi).
- rtlwifi: rtl8821ae: fix firmware is not ready to run (bnc#1012382).
- s390/qeth: fix error handling in adapter command callbacks (bnc#1103745, LTC#169699).
- sched/smt: Update sched_smt_present at runtime (bsc#1089343).
- smsc75xx: Add workaround for gigabit link up hardware errata (bsc#1100132).
- smsc95xx: Configure pause time to 0xffff when tx flow control enabled (bsc#1085536).
- tcp: fix Fast Open key endianness (bnc#1012382).
- tcp: prevent bogus FRTO undos with non-SACK flows (bnc#1012382).
- tools build: fix # escaping in .cmd files for future Make (bnc#1012382).
- uprobes/x86: Remove incorrect WARN_ON() in uprobe_init_insn() (bnc#1012382).
- usb: core: handle hub C_PORT_OVER_CURRENT condition (bsc#1100132).
- usb: quirks: add delay quirks for Corsair Strafe (bnc#1012382).
- usb: serial: ch341: fix type promotion bug in ch341_control_in() (bnc#1012382).
- usb: serial: cp210x: add another USB ID for Qivicon ZigBee stick (bnc#1012382).
- usb: serial: keyspan_pda: fix modem-status error handling (bnc#1012382).
- usb: serial: mos7840: fix status-register error handling (bnc#1012382).
- usb: yurex: fix out-of-bounds uaccess in read handler (bnc#1012382).
- vfio: platform: Fix reset module leak in error path (bsc#1102211).
- vhost_net: validate sock before trying to put its fd (bnc#1012382).
- vmw_balloon: fix inflation with batching (bnc#1012382).
- x86/alternatives: Add an auxilary section (bnc#1012382).
- x86/alternatives: Discard dynamic check after init (bnc#1012382).
- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).
- x86/asm: Add _ASM_ARG* constants for argument registers to <asm/asm.h> (bnc#1012382).
- x86/boot: Simplify kernel load address alignment check (bnc#1012382).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343). Update config files.
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpufeature: Add helper macro for mask check macros (bnc#1012382).
- x86/cpufeature: Carve out X86_FEATURE_* (bnc#1012382).
- x86/cpufeature: Get rid of the non-asm goto variant (bnc#1012382).
- x86/cpufeature: Make sure DISABLED/REQUIRED macros are updated (bnc#1012382).
- x86/cpufeature: Move some of the scattered feature bits to x86_capability (bnc#1012382).
- x86/cpufeature: Replace the old static_cpu_has() with safe variant (bnc#1012382).
- x86/cpufeature: Speed up cpu_feature_enabled() (bnc#1012382).
- x86/cpufeature: Update cpufeaure macros (bnc#1012382).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6 (bnc#1012382).
- x86/cpu: Provide a config option to disable static_cpu_has (bnc#1012382).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/fpu: Add an XSTATE_OP() macro (bnc#1012382).
- x86/fpu: Get rid of xstate_fault() (bnc#1012382).
- x86/headers: Do not include asm/processor.h in asm/atomic.h (bnc#1012382).
- x86/mm/pkeys: Fix mismerge of protection keys CPUID bits (bnc#1012382).
- x86/mm: Simplify p[g4um]d_page() macros (1087081).
- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/topology: Add topology_max_smt_threads() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- x86/vdso: Use static_cpu_has() (bnc#1012382).
- xen/grant-table: log the lack of grants (bnc#1085042).
- xen-netfront: Fix mismatched rtnl_unlock (bnc#1101658).
- xen-netfront: Update features after registering netdev (bnc#1101658).
- xhci: xhci-mem: off by one in xhci_stream_id_to_ring() (bnc#1012382).
Patchnames
SUSE-SLE-DESKTOP-12-SP3-2018-1566,SUSE-SLE-HA-12-SP3-2018-1566,SUSE-SLE-Live-Patching-12-SP3-2018-1566,SUSE-SLE-SDK-12-SP3-2018-1566,SUSE-SLE-SERVER-12-SP3-2018-1566,SUSE-SLE-WE-12-SP3-2018-1566
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.143 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-5390 aka \u0027SegmentSmack\u0027: Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bnc#1102340).\n- CVE-2018-14734: drivers/infiniband/core/ucma.c in the Linux kernel allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).\n- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn\u0027t properly validate the sigevent-\u003esigev_notify field, which lead to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bnc#1102851 bnc#1103580).\n- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).\n\nThe following non-security bugs were fixed:\n\n- Add support for 5,25,50, and 100G to 802.3ad bonding driver (bsc#1096978)\n- ahci: Disable LPM on Lenovo 50 series laptops with a too old BIOS (bnc#1012382).\n- arm64: do not open code page table entry creation (bsc#1102197).\n- arm64: kpti: Use early_param for kpti= command-line option (bsc#1102188).\n- arm64: Make sure permission updates happen for pmd/pud (bsc#1102197).\n- atm: zatm: Fix potential Spectre v1 (bnc#1012382).\n- bcm63xx_enet: correct clock usage (bnc#1012382).\n- bcm63xx_enet: do not write to random DMA channel on BCM6345 (bnc#1012382).\n- blacklist 9fb8d5dc4b64 (\u0027stop_machine: Disable preemption when waking two stopper threads\u0027) Preemption is already disabled inside cpu_stop_queue_two_works() in SLE12-SP3 because it does not have commit 6a19005157c4 (\u0027stop_machine: Do not disable preemption in stop_two_cpus()\u0027)\n- block: copy ioprio in __bio_clone_fast() (bsc#1082653).\n- bpf: fix loading of BPF_MAXINSNS sized programs (bsc#1012382).\n- bpf, x64: fix memleak when not converging after image (bsc#1012382).\n- cachefiles: Fix missing clear of the CACHEFILES_OBJECT_ACTIVE flag (bsc#1099858).\n- cachefiles: Fix refcounting bug in backing-file read monitoring (bsc#1099858).\n- cachefiles: Wait rather than BUG\u0027ing on \u0027Unexpected object collision\u0027 (bsc#1099858).\n- cifs: fix bad/NULL ptr dereferencing in SMB2_sess_setup() (bsc#1090123).\n- compiler, clang: always inline when CONFIG_OPTIMIZE_INLINING is disabled (bnc#1012382).\n- compiler, clang: properly override \u0027inline\u0027 for clang (bnc#1012382).\n- compiler, clang: suppress warning for unused static inline functions (bnc#1012382).\n- compiler-gcc.h: Add __attribute__((gnu_inline)) to all inline declarations (bnc#1012382).\n- cpu/hotplug: Add sysfs state interface (bsc#1089343).\n- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).\n- cpu/hotplug: Split do_cpu_down() (bsc#1089343).\n- crypto: crypto4xx - fix crypto4xx_build_pdr, crypto4xx_build_sdr leak (bnc#1012382).\n- crypto: crypto4xx - remove bad list_del (bnc#1012382).\n- drm/msm: Fix possible null dereference on failure of get_pages() (bsc#1102394).\n- drm: re-enable error handling (bsc#1103884).\n- fscache: Allow cancelled operations to be enqueued (bsc#1099858).\n- fscache: Fix reference overput in fscache_attach_object() error handling (bsc#1099858).\n- hid: usbhid: add quirk for innomedia INNEX GENESIS/ATARI adapter (bnc#1012382).\n- ibmasm: do not write out of bounds in read handler (bnc#1012382).\n- ibmvnic: Fix error recovery on login failure (bsc#1101789).\n- iw_cxgb4: correctly enforce the max reg_mr depth (bnc#1012382).\n- kabi protect includes in include/linux/inet.h (bsc#1095643).\n- KABI protect net/core/utils.c includes (bsc#1095643).\n- kABI: protect struct loop_device (kabi).\n- kABI: reintroduce __static_cpu_has_safe (kabi).\n- kbuild: fix # escaping in .cmd files for future Make (bnc#1012382).\n- keys: DNS: fix parsing multiple options (bnc#1012382).\n- kvm: arm/arm64: Drop resource size check for GICV window (bsc#1102215).\n- kvm: arm/arm64: Set dist-\u003espis to NULL after kfree (bsc#1102214).\n- loop: add recursion validation to LOOP_CHANGE_FD (bnc#1012382).\n- loop: remember whether sysfs_create_group() was done (bnc#1012382).\n- mmc: dw_mmc: fix card threshold control configuration (bsc#1102203).\n- mm: check VMA flags to avoid invalid PROT_NONE NUMA balancing (bsc#1097771).\n- net: cxgb3_main: fix potential Spectre v1 (bnc#1012382).\n- net: dccp: avoid crash in ccid3_hc_rx_send_feedback() (bnc#1012382).\n- net: dccp: switch rx_tstamp_last_feedback to monotonic clock (bnc#1012382).\n- netfilter: ebtables: reject non-bridge targets (bnc#1012382).\n- netfilter: nf_queue: augment nfqa_cfg_policy (bnc#1012382).\n- netfilter: x_tables: initialise match/target check parameter struct (bnc#1012382).\n- net/mlx5: Fix command interface race in polling mode (bnc#1012382).\n- net/mlx5: Fix incorrect raw command length parsing (bnc#1012382).\n- net: mvneta: fix the Rx desc DMA address in the Rx path (bsc#1102207).\n- net/nfc: Avoid stalls when nfc_alloc_send_skb() returned NULL (bnc#1012382).\n- net: off by one in inet6_pton() (bsc#1095643).\n- net: phy: marvell: Use strlcpy() for ethtool::get_strings (bsc#1102205).\n- net_sched: blackhole: tell upper qdisc about dropped packets (bnc#1012382).\n- net: sungem: fix rx checksum support (bnc#1012382).\n- net/utils: generic inet_pton_with_scope helper (bsc#1095643).\n- nvme-rdma: Check remotely invalidated rkey matches our expected rkey (bsc#1092001).\n- nvme-rdma: default MR page size to 4k (bsc#1092001).\n- nvme-rdma: do not complete requests before a send work request has completed (bsc#1092001).\n- nvme-rdma: do not suppress send completions (bsc#1092001).\n- nvme-rdma: Fix command completion race at error recovery (bsc#1090435).\n- nvme-rdma: make nvme_rdma_[create|destroy]_queue_ib symmetrical (bsc#1092001).\n- nvme-rdma: use inet_pton_with_scope helper (bsc#1095643).\n- nvme-rdma: Use mr pool (bsc#1092001).\n- nvme-rdma: wait for local invalidation before completing a request (bsc#1092001).\n- ocfs2: subsystem.su_mutex is required while accessing the item-\u003eci_parent (bnc#1012382).\n- pci: ibmphp: Fix use-before-set in get_max_bus_speed() (bsc#1100132).\n- perf tools: Move syscall number fallbacks from perf-sys.h to tools/arch/x86/include/asm/ (bnc#1012382).\n- pm / hibernate: Fix oops at snapshot_write() (bnc#1012382).\n- powerpc/64: Initialise thread_info for emergency stacks (bsc#1094244, bsc#1100930, bsc#1102683).\n- qed: Limit msix vectors in kdump kernel to the minimum required count (bnc#1012382).\n- r8152: napi hangup fix after disconnect (bnc#1012382).\n- rdma/ucm: Mark UCM interface as BROKEN (bnc#1012382).\n- rds: avoid unenecessary cong_update in loop transport (bnc#1012382).\n- Revert \u0027sit: reload iphdr in ipip6_rcv\u0027 (bnc#1012382).\n- Revert \u0027x86/cpufeature: Move some of the scattered feature bits to x86_capability\u0027 (kabi).\n- Revert \u0027x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6\u0027 (kabi).\n- rtlwifi: rtl8821ae: fix firmware is not ready to run (bnc#1012382).\n- s390/qeth: fix error handling in adapter command callbacks (bnc#1103745, LTC#169699).\n- sched/smt: Update sched_smt_present at runtime (bsc#1089343).\n- smsc75xx: Add workaround for gigabit link up hardware errata (bsc#1100132).\n- smsc95xx: Configure pause time to 0xffff when tx flow control enabled (bsc#1085536).\n- tcp: fix Fast Open key endianness (bnc#1012382).\n- tcp: prevent bogus FRTO undos with non-SACK flows (bnc#1012382).\n- tools build: fix # escaping in .cmd files for future Make (bnc#1012382).\n- uprobes/x86: Remove incorrect WARN_ON() in uprobe_init_insn() (bnc#1012382).\n- usb: core: handle hub C_PORT_OVER_CURRENT condition (bsc#1100132).\n- usb: quirks: add delay quirks for Corsair Strafe (bnc#1012382).\n- usb: serial: ch341: fix type promotion bug in ch341_control_in() (bnc#1012382).\n- usb: serial: cp210x: add another USB ID for Qivicon ZigBee stick (bnc#1012382).\n- usb: serial: keyspan_pda: fix modem-status error handling (bnc#1012382).\n- usb: serial: mos7840: fix status-register error handling (bnc#1012382).\n- usb: yurex: fix out-of-bounds uaccess in read handler (bnc#1012382).\n- vfio: platform: Fix reset module leak in error path (bsc#1102211).\n- vhost_net: validate sock before trying to put its fd (bnc#1012382).\n- vmw_balloon: fix inflation with batching (bnc#1012382).\n- x86/alternatives: Add an auxilary section (bnc#1012382).\n- x86/alternatives: Discard dynamic check after init (bnc#1012382).\n- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).\n- x86/asm: Add _ASM_ARG* constants for argument registers to \u003casm/asm.h\u003e (bnc#1012382).\n- x86/boot: Simplify kernel load address alignment check (bnc#1012382).\n- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).\n- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343). Update config files.\n- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).\n- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- x86/cpufeature: Add helper macro for mask check macros (bnc#1012382).\n- x86/cpufeature: Carve out X86_FEATURE_* (bnc#1012382).\n- x86/cpufeature: Get rid of the non-asm goto variant (bnc#1012382).\n- x86/cpufeature: Make sure DISABLED/REQUIRED macros are updated (bnc#1012382).\n- x86/cpufeature: Move some of the scattered feature bits to x86_capability (bnc#1012382).\n- x86/cpufeature: Replace the old static_cpu_has() with safe variant (bnc#1012382).\n- x86/cpufeature: Speed up cpu_feature_enabled() (bnc#1012382).\n- x86/cpufeature: Update cpufeaure macros (bnc#1012382).\n- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6 (bnc#1012382).\n- x86/cpu: Provide a config option to disable static_cpu_has (bnc#1012382).\n- x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- x86/fpu: Add an XSTATE_OP() macro (bnc#1012382).\n- x86/fpu: Get rid of xstate_fault() (bnc#1012382).\n- x86/headers: Do not include asm/processor.h in asm/atomic.h (bnc#1012382).\n- x86/mm/pkeys: Fix mismerge of protection keys CPUID bits (bnc#1012382).\n- x86/mm: Simplify p[g4um]d_page() macros (1087081).\n- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).\n- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).\n- x86/topology: Add topology_max_smt_threads() (bsc#1089343).\n- x86/topology: Provide topology_smt_supported() (bsc#1089343).\n- x86/vdso: Use static_cpu_has() (bnc#1012382).\n- xen/grant-table: log the lack of grants (bnc#1085042).\n- xen-netfront: Fix mismatched rtnl_unlock (bnc#1101658).\n- xen-netfront: Update features after registering netdev (bnc#1101658).\n- xhci: xhci-mem: off by one in xhci_stream_id_to_ring() (bnc#1012382).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP3-2018-1566,SUSE-SLE-HA-12-SP3-2018-1566,SUSE-SLE-Live-Patching-12-SP3-2018-1566,SUSE-SLE-SDK-12-SP3-2018-1566,SUSE-SLE-SERVER-12-SP3-2018-1566,SUSE-SLE-WE-12-SP3-2018-1566", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2328-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2328-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182328-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2328-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004414.html" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1082653", "url": "https://bugzilla.suse.com/1082653" }, { "category": "self", "summary": "SUSE Bug 1085042", "url": "https://bugzilla.suse.com/1085042" }, { "category": "self", "summary": "SUSE Bug 1085536", "url": "https://bugzilla.suse.com/1085536" }, { "category": "self", "summary": "SUSE Bug 1087081", "url": "https://bugzilla.suse.com/1087081" }, { "category": "self", "summary": "SUSE Bug 1089343", "url": "https://bugzilla.suse.com/1089343" }, { "category": "self", "summary": "SUSE Bug 1090123", "url": "https://bugzilla.suse.com/1090123" }, { "category": "self", "summary": "SUSE Bug 1090435", "url": "https://bugzilla.suse.com/1090435" }, { "category": "self", "summary": "SUSE Bug 1092001", "url": "https://bugzilla.suse.com/1092001" }, { "category": "self", "summary": "SUSE Bug 1094244", "url": "https://bugzilla.suse.com/1094244" }, { "category": "self", "summary": "SUSE Bug 1095643", "url": "https://bugzilla.suse.com/1095643" }, { "category": "self", "summary": "SUSE Bug 1096978", "url": "https://bugzilla.suse.com/1096978" }, { "category": "self", "summary": "SUSE Bug 1097771", "url": "https://bugzilla.suse.com/1097771" }, { "category": "self", "summary": "SUSE Bug 1099858", "url": "https://bugzilla.suse.com/1099858" }, { "category": "self", "summary": "SUSE Bug 1100132", "url": "https://bugzilla.suse.com/1100132" }, { "category": "self", "summary": "SUSE Bug 1100930", "url": "https://bugzilla.suse.com/1100930" }, { "category": "self", "summary": "SUSE Bug 1101658", "url": "https://bugzilla.suse.com/1101658" }, { "category": "self", "summary": "SUSE Bug 1101789", "url": "https://bugzilla.suse.com/1101789" }, { "category": "self", "summary": "SUSE Bug 1102188", "url": "https://bugzilla.suse.com/1102188" }, { "category": "self", "summary": "SUSE Bug 1102197", "url": "https://bugzilla.suse.com/1102197" }, { "category": "self", "summary": "SUSE Bug 1102203", "url": "https://bugzilla.suse.com/1102203" }, { "category": "self", "summary": "SUSE Bug 1102205", "url": "https://bugzilla.suse.com/1102205" }, { "category": "self", "summary": "SUSE Bug 1102207", "url": "https://bugzilla.suse.com/1102207" }, { "category": "self", "summary": "SUSE Bug 1102211", "url": "https://bugzilla.suse.com/1102211" }, { "category": "self", "summary": "SUSE Bug 1102214", "url": "https://bugzilla.suse.com/1102214" }, { "category": "self", "summary": "SUSE Bug 1102215", "url": "https://bugzilla.suse.com/1102215" }, { "category": "self", "summary": "SUSE Bug 1102340", "url": "https://bugzilla.suse.com/1102340" }, { "category": "self", "summary": "SUSE Bug 1102394", "url": "https://bugzilla.suse.com/1102394" }, { "category": "self", "summary": "SUSE Bug 1102683", "url": "https://bugzilla.suse.com/1102683" }, { "category": "self", "summary": "SUSE Bug 1102851", "url": "https://bugzilla.suse.com/1102851" }, { "category": "self", "summary": "SUSE Bug 1103119", "url": "https://bugzilla.suse.com/1103119" }, { "category": "self", "summary": "SUSE Bug 1103580", "url": "https://bugzilla.suse.com/1103580" }, { "category": "self", "summary": "SUSE Bug 1103745", "url": "https://bugzilla.suse.com/1103745" }, { "category": "self", "summary": "SUSE Bug 1103884", "url": "https://bugzilla.suse.com/1103884" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18344 page", "url": "https://www.suse.com/security/cve/CVE-2017-18344/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14734 page", "url": "https://www.suse.com/security/cve/CVE-2018-14734/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3620 page", "url": "https://www.suse.com/security/cve/CVE-2018-3620/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-08-14T17:02:07Z", "generator": { "date": "2018-08-14T17:02:07Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2328-1", "initial_release_date": "2018-08-14T17:02:07Z", "revision_history": [ { "date": "2018-08-14T17:02:07Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "dpdk-devel-16.11.6-8.7.2.aarch64", "product": { "name": "dpdk-devel-16.11.6-8.7.2.aarch64", "product_id": "dpdk-devel-16.11.6-8.7.2.aarch64" } }, { "category": "product_version", "name": "dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "product": { "name": "dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "product_id": "dpdk-thunderx-devel-16.11.6-8.7.2.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.143-94.47.1.aarch64", "product": { "name": "kernel-obs-build-4.4.143-94.47.1.aarch64", "product_id": "kernel-obs-build-4.4.143-94.47.1.aarch64" } }, { "category": "product_version", "name": "dpdk-16.11.6-8.7.2.aarch64", "product": { "name": "dpdk-16.11.6-8.7.2.aarch64", "product_id": "dpdk-16.11.6-8.7.2.aarch64" } }, { "category": "product_version", "name": "dpdk-thunderx-16.11.6-8.7.2.aarch64", "product": { "name": "dpdk-thunderx-16.11.6-8.7.2.aarch64", "product_id": "dpdk-thunderx-16.11.6-8.7.2.aarch64" } }, { "category": "product_version", "name": "dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "product": { "name": "dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "product_id": "dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64" } }, { "category": "product_version", "name": "dpdk-tools-16.11.6-8.7.2.aarch64", "product": { "name": "dpdk-tools-16.11.6-8.7.2.aarch64", "product_id": "dpdk-tools-16.11.6-8.7.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.4.143-94.47.1.aarch64", "product": { "name": "kernel-default-4.4.143-94.47.1.aarch64", "product_id": "kernel-default-4.4.143-94.47.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.143-94.47.1.aarch64", "product": { "name": "kernel-default-base-4.4.143-94.47.1.aarch64", "product_id": "kernel-default-base-4.4.143-94.47.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.143-94.47.1.aarch64", "product": { "name": "kernel-default-devel-4.4.143-94.47.1.aarch64", "product_id": "kernel-default-devel-4.4.143-94.47.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.4.143-94.47.1.aarch64", "product": { "name": "kernel-syms-4.4.143-94.47.1.aarch64", "product_id": "kernel-syms-4.4.143-94.47.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.143-94.47.1.noarch", "product": { "name": "kernel-devel-4.4.143-94.47.1.noarch", "product_id": "kernel-devel-4.4.143-94.47.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.143-94.47.1.noarch", "product": { "name": "kernel-macros-4.4.143-94.47.1.noarch", "product_id": "kernel-macros-4.4.143-94.47.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.143-94.47.1.noarch", "product": { "name": "kernel-source-4.4.143-94.47.1.noarch", "product_id": "kernel-source-4.4.143-94.47.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.4.143-94.47.1.noarch", "product": { "name": "kernel-docs-4.4.143-94.47.1.noarch", "product_id": "kernel-docs-4.4.143-94.47.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "product_id": "cluster-md-kmp-default-4.4.143-94.47.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.143-94.47.1.ppc64le", "product": { "name": "dlm-kmp-default-4.4.143-94.47.1.ppc64le", "product_id": "dlm-kmp-default-4.4.143-94.47.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "product_id": "gfs2-kmp-default-4.4.143-94.47.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "product_id": "ocfs2-kmp-default-4.4.143-94.47.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "product": { "name": "kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "product_id": "kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le" } }, { "category": "product_version", "name": "dpdk-devel-16.11.6-8.7.2.ppc64le", "product": { "name": "dpdk-devel-16.11.6-8.7.2.ppc64le", "product_id": "dpdk-devel-16.11.6-8.7.2.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.143-94.47.1.ppc64le", "product": { "name": "kernel-obs-build-4.4.143-94.47.1.ppc64le", "product_id": "kernel-obs-build-4.4.143-94.47.1.ppc64le" } }, { "category": "product_version", "name": "dpdk-16.11.6-8.7.2.ppc64le", "product": { "name": "dpdk-16.11.6-8.7.2.ppc64le", "product_id": "dpdk-16.11.6-8.7.2.ppc64le" } }, { "category": "product_version", "name": "dpdk-tools-16.11.6-8.7.2.ppc64le", "product": { "name": "dpdk-tools-16.11.6-8.7.2.ppc64le", "product_id": "dpdk-tools-16.11.6-8.7.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.4.143-94.47.1.ppc64le", "product": { "name": "kernel-default-4.4.143-94.47.1.ppc64le", "product_id": "kernel-default-4.4.143-94.47.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.143-94.47.1.ppc64le", "product": { "name": "kernel-default-base-4.4.143-94.47.1.ppc64le", "product_id": "kernel-default-base-4.4.143-94.47.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.143-94.47.1.ppc64le", "product": { "name": "kernel-default-devel-4.4.143-94.47.1.ppc64le", "product_id": "kernel-default-devel-4.4.143-94.47.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.143-94.47.1.ppc64le", "product": { "name": "kernel-syms-4.4.143-94.47.1.ppc64le", "product_id": "kernel-syms-4.4.143-94.47.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.143-94.47.1.s390x", "product": { "name": "cluster-md-kmp-default-4.4.143-94.47.1.s390x", "product_id": "cluster-md-kmp-default-4.4.143-94.47.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.143-94.47.1.s390x", "product": { "name": "dlm-kmp-default-4.4.143-94.47.1.s390x", "product_id": "dlm-kmp-default-4.4.143-94.47.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.143-94.47.1.s390x", "product": { "name": "gfs2-kmp-default-4.4.143-94.47.1.s390x", "product_id": "gfs2-kmp-default-4.4.143-94.47.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.143-94.47.1.s390x", "product": { "name": "ocfs2-kmp-default-4.4.143-94.47.1.s390x", "product_id": "ocfs2-kmp-default-4.4.143-94.47.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.143-94.47.1.s390x", "product": { "name": "kernel-obs-build-4.4.143-94.47.1.s390x", "product_id": "kernel-obs-build-4.4.143-94.47.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.4.143-94.47.1.s390x", "product": { "name": "kernel-default-4.4.143-94.47.1.s390x", "product_id": "kernel-default-4.4.143-94.47.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.143-94.47.1.s390x", "product": { "name": "kernel-default-base-4.4.143-94.47.1.s390x", "product_id": "kernel-default-base-4.4.143-94.47.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.143-94.47.1.s390x", "product": { "name": "kernel-default-devel-4.4.143-94.47.1.s390x", "product_id": "kernel-default-devel-4.4.143-94.47.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.143-94.47.1.s390x", "product": { "name": "kernel-default-man-4.4.143-94.47.1.s390x", "product_id": "kernel-default-man-4.4.143-94.47.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.143-94.47.1.s390x", "product": { "name": "kernel-syms-4.4.143-94.47.1.s390x", "product_id": "kernel-syms-4.4.143-94.47.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.4.143-94.47.1.x86_64", "product": { "name": "kernel-default-4.4.143-94.47.1.x86_64", "product_id": "kernel-default-4.4.143-94.47.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.143-94.47.1.x86_64", "product": { "name": "kernel-default-devel-4.4.143-94.47.1.x86_64", "product_id": "kernel-default-devel-4.4.143-94.47.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.143-94.47.1.x86_64", "product": { "name": "kernel-default-extra-4.4.143-94.47.1.x86_64", "product_id": "kernel-default-extra-4.4.143-94.47.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.143-94.47.1.x86_64", "product": { "name": "kernel-syms-4.4.143-94.47.1.x86_64", "product_id": "kernel-syms-4.4.143-94.47.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "product_id": "cluster-md-kmp-default-4.4.143-94.47.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.143-94.47.1.x86_64", "product": { "name": "dlm-kmp-default-4.4.143-94.47.1.x86_64", "product_id": "dlm-kmp-default-4.4.143-94.47.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.143-94.47.1.x86_64", "product": { "name": "gfs2-kmp-default-4.4.143-94.47.1.x86_64", "product_id": "gfs2-kmp-default-4.4.143-94.47.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "product_id": "ocfs2-kmp-default-4.4.143-94.47.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "product": { "name": "kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "product_id": "kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64" } }, { "category": "product_version", "name": "dpdk-devel-16.11.6-8.7.2.x86_64", "product": { "name": "dpdk-devel-16.11.6-8.7.2.x86_64", "product_id": "dpdk-devel-16.11.6-8.7.2.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.143-94.47.1.x86_64", "product": { "name": "kernel-obs-build-4.4.143-94.47.1.x86_64", "product_id": "kernel-obs-build-4.4.143-94.47.1.x86_64" } }, { "category": "product_version", "name": "dpdk-16.11.6-8.7.2.x86_64", "product": { "name": "dpdk-16.11.6-8.7.2.x86_64", "product_id": "dpdk-16.11.6-8.7.2.x86_64" } }, { "category": "product_version", "name": "dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "product": { "name": "dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "product_id": "dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64" } }, { "category": "product_version", "name": "dpdk-tools-16.11.6-8.7.2.x86_64", "product": { "name": "dpdk-tools-16.11.6-8.7.2.x86_64", "product_id": "dpdk-tools-16.11.6-8.7.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.143-94.47.1.x86_64", "product": { "name": "kernel-default-base-4.4.143-94.47.1.x86_64", "product_id": "kernel-default-base-4.4.143-94.47.1.x86_64" } }, { "category": "product_version", "name": "lttng-modules-2.7.1-8.4.2.x86_64", "product": { "name": "lttng-modules-2.7.1-8.4.2.x86_64", "product_id": "lttng-modules-2.7.1-8.4.2.x86_64" } }, { "category": "product_version", "name": "lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "product": { "name": "lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "product_id": "lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3", "product": { "name": "SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP3", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP3", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.143-94.47.1.x86_64" }, "product_reference": "kernel-default-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64" }, "product_reference": "kernel-default-extra-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.143-94.47.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.143-94.47.1.noarch" }, "product_reference": "kernel-devel-4.4.143-94.47.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.143-94.47.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.143-94.47.1.noarch" }, "product_reference": "kernel-macros-4.4.143-94.47.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.143-94.47.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.143-94.47.1.noarch" }, "product_reference": "kernel-source-4.4.143-94.47.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64" }, "product_reference": "kernel-syms-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.143-94.47.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.143-94.47.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.4.143-94.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.143-94.47.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.4.143-94.47.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.143-94.47.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.s390x" }, "product_reference": "dlm-kmp-default-4.4.143-94.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.x86_64" }, "product_reference": "dlm-kmp-default-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.143-94.47.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.143-94.47.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.s390x" }, "product_reference": "gfs2-kmp-default-4.4.143-94.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.143-94.47.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.143-94.47.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.4.143-94.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64" }, "product_reference": "kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-devel-16.11.6-8.7.2.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.aarch64" }, "product_reference": "dpdk-devel-16.11.6-8.7.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-devel-16.11.6-8.7.2.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.ppc64le" }, "product_reference": "dpdk-devel-16.11.6-8.7.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-devel-16.11.6-8.7.2.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.x86_64" }, "product_reference": "dpdk-devel-16.11.6-8.7.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-thunderx-devel-16.11.6-8.7.2.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-thunderx-devel-16.11.6-8.7.2.aarch64" }, "product_reference": "dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.4.143-94.47.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.143-94.47.1.noarch" }, "product_reference": "kernel-docs-4.4.143-94.47.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.4.143-94.47.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.aarch64" }, "product_reference": "kernel-obs-build-4.4.143-94.47.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.4.143-94.47.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.ppc64le" }, "product_reference": "kernel-obs-build-4.4.143-94.47.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.4.143-94.47.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.s390x" }, "product_reference": "kernel-obs-build-4.4.143-94.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.x86_64" }, "product_reference": "kernel-obs-build-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-16.11.6-8.7.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.aarch64" }, "product_reference": "dpdk-16.11.6-8.7.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-16.11.6-8.7.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.ppc64le" }, "product_reference": "dpdk-16.11.6-8.7.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-16.11.6-8.7.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.x86_64" }, "product_reference": "dpdk-16.11.6-8.7.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64" }, "product_reference": "dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-thunderx-16.11.6-8.7.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64" }, "product_reference": "dpdk-thunderx-16.11.6-8.7.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64" }, "product_reference": "dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-tools-16.11.6-8.7.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64" }, "product_reference": "dpdk-tools-16.11.6-8.7.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-tools-16.11.6-8.7.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le" }, "product_reference": "dpdk-tools-16.11.6-8.7.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-tools-16.11.6-8.7.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64" }, "product_reference": "dpdk-tools-16.11.6-8.7.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.143-94.47.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.aarch64" }, "product_reference": "kernel-default-4.4.143-94.47.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.143-94.47.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le" }, "product_reference": "kernel-default-4.4.143-94.47.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.143-94.47.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.s390x" }, "product_reference": "kernel-default-4.4.143-94.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.x86_64" }, "product_reference": "kernel-default-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.143-94.47.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64" }, "product_reference": "kernel-default-base-4.4.143-94.47.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.143-94.47.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.143-94.47.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.143-94.47.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x" }, "product_reference": "kernel-default-base-4.4.143-94.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64" }, "product_reference": "kernel-default-base-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.143-94.47.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64" }, "product_reference": "kernel-default-devel-4.4.143-94.47.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.143-94.47.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.143-94.47.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.143-94.47.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x" }, "product_reference": "kernel-default-devel-4.4.143-94.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.143-94.47.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x" }, "product_reference": "kernel-default-man-4.4.143-94.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.143-94.47.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.143-94.47.1.noarch" }, "product_reference": "kernel-devel-4.4.143-94.47.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.143-94.47.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.143-94.47.1.noarch" }, "product_reference": "kernel-macros-4.4.143-94.47.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.143-94.47.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.143-94.47.1.noarch" }, "product_reference": "kernel-source-4.4.143-94.47.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.143-94.47.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64" }, "product_reference": "kernel-syms-4.4.143-94.47.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.143-94.47.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le" }, "product_reference": "kernel-syms-4.4.143-94.47.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.143-94.47.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.s390x" }, "product_reference": "kernel-syms-4.4.143-94.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64" }, "product_reference": "kernel-syms-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-2.7.1-8.4.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64" }, "product_reference": "lttng-modules-2.7.1-8.4.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64" }, "product_reference": "lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-16.11.6-8.7.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.aarch64" }, "product_reference": "dpdk-16.11.6-8.7.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-16.11.6-8.7.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.ppc64le" }, "product_reference": "dpdk-16.11.6-8.7.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-16.11.6-8.7.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.x86_64" }, "product_reference": "dpdk-16.11.6-8.7.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64" }, "product_reference": "dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-thunderx-16.11.6-8.7.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64" }, "product_reference": "dpdk-thunderx-16.11.6-8.7.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64" }, "product_reference": "dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-tools-16.11.6-8.7.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64" }, "product_reference": "dpdk-tools-16.11.6-8.7.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-tools-16.11.6-8.7.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le" }, "product_reference": "dpdk-tools-16.11.6-8.7.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dpdk-tools-16.11.6-8.7.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64" }, "product_reference": "dpdk-tools-16.11.6-8.7.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.143-94.47.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.aarch64" }, "product_reference": "kernel-default-4.4.143-94.47.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.143-94.47.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le" }, "product_reference": "kernel-default-4.4.143-94.47.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.143-94.47.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.s390x" }, "product_reference": "kernel-default-4.4.143-94.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.x86_64" }, "product_reference": "kernel-default-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.143-94.47.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64" }, "product_reference": "kernel-default-base-4.4.143-94.47.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.143-94.47.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.143-94.47.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.143-94.47.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x" }, "product_reference": "kernel-default-base-4.4.143-94.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64" }, "product_reference": "kernel-default-base-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.143-94.47.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64" }, "product_reference": "kernel-default-devel-4.4.143-94.47.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.143-94.47.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.143-94.47.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.143-94.47.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x" }, "product_reference": "kernel-default-devel-4.4.143-94.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.143-94.47.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x" }, "product_reference": "kernel-default-man-4.4.143-94.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.143-94.47.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.143-94.47.1.noarch" }, "product_reference": "kernel-devel-4.4.143-94.47.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.143-94.47.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.143-94.47.1.noarch" }, "product_reference": "kernel-macros-4.4.143-94.47.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.143-94.47.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.143-94.47.1.noarch" }, "product_reference": "kernel-source-4.4.143-94.47.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.143-94.47.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64" }, "product_reference": "kernel-syms-4.4.143-94.47.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.143-94.47.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le" }, "product_reference": "kernel-syms-4.4.143-94.47.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.143-94.47.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.s390x" }, "product_reference": "kernel-syms-4.4.143-94.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64" }, "product_reference": "kernel-syms-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-2.7.1-8.4.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64" }, "product_reference": "lttng-modules-2.7.1-8.4.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64" }, "product_reference": "lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.4.143-94.47.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP3", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64" }, "product_reference": "kernel-default-extra-4.4.143-94.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-18344", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18344" } ], "notes": [ { "category": "general", "text": "The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18344", "url": "https://www.suse.com/security/cve/CVE-2017-18344" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102851 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1102851" }, { "category": "external", "summary": "SUSE Bug 1103203 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103203" }, { "category": "external", "summary": "SUSE Bug 1103580 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103580" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-14T17:02:07Z", "details": "moderate" } ], "title": "CVE-2017-18344" }, { "cve": "CVE-2018-14734", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14734" } ], "notes": [ { "category": "general", "text": "drivers/infiniband/core/ucma.c in the Linux kernel through 4.17.11 allows ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14734", "url": "https://www.suse.com/security/cve/CVE-2018-14734" }, { "category": "external", "summary": "SUSE Bug 1103119 for CVE-2018-14734", "url": "https://bugzilla.suse.com/1103119" }, { "category": "external", "summary": "SUSE Bug 1131390 for CVE-2018-14734", "url": "https://bugzilla.suse.com/1131390" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-14T17:02:07Z", "details": "low" } ], "title": "CVE-2018-14734" }, { "cve": "CVE-2018-3620", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3620" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3620", "url": "https://www.suse.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1090340 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1090340" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-14T17:02:07Z", "details": "moderate" } ], "title": "CVE-2018-3620" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-14T17:02:07Z", "details": "important" } ], "title": "CVE-2018-3646" }, { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-1-4.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-thunderx-kmp-default-16.11.6_k4.4.143_94.47-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:dpdk-tools-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-2.7.1-8.4.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:lttng-modules-kmp-default-2.7.1_k4.4.143_94.47-8.4.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-devel-16.11.6-8.7.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:dpdk-thunderx-devel-16.11.6-8.7.2.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.143-94.47.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.143-94.47.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.143-94.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-14T17:02:07Z", "details": "moderate" } ], "title": "CVE-2018-5390" } ] }
suse-su-2018:2480-1
Vulnerability from csaf_suse
Published
2018-08-22 14:31
Modified
2018-08-22 14:31
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following security issue:
- CVE-2018-3646: Systems with microprocessors utilizing speculative execution
and address translations may have allowed unauthorized disclosure of
information residing in the L1 data cache to an attacker with local user access
with guest OS privilege via a terminal page fault and a side-channel analysis
(bsc#1091107, bsc#1027519).
Patchnames
SUSE-SLE-SAP-12-SP1-2018-1743,SUSE-SLE-SERVER-12-SP1-2018-1743
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following security issue:\n\n- CVE-2018-3646: Systems with microprocessors utilizing speculative execution\n and address translations may have allowed unauthorized disclosure of\n information residing in the L1 data cache to an attacker with local user access\n with guest OS privilege via a terminal page fault and a side-channel analysis\n (bsc#1091107, bsc#1027519).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-1743,SUSE-SLE-SERVER-12-SP1-2018-1743", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2480-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2480-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182480-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2480-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004490.html" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1091107", "url": "https://bugzilla.suse.com/1091107" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2018-08-22T14:31:48Z", "generator": { "date": "2018-08-22T14:31:48Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2480-1", "initial_release_date": "2018-08-22T14:31:48Z", "revision_history": [ { "date": "2018-08-22T14:31:48Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.5.5_26-22.55.2.x86_64", "product": { "name": "xen-4.5.5_26-22.55.2.x86_64", "product_id": "xen-4.5.5_26-22.55.2.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.5.5_26-22.55.2.x86_64", "product": { "name": "xen-doc-html-4.5.5_26-22.55.2.x86_64", "product_id": "xen-doc-html-4.5.5_26-22.55.2.x86_64" } }, { "category": "product_version", "name": "xen-kmp-default-4.5.5_26_k3.12.74_60.64.99-22.55.2.x86_64", "product": { "name": "xen-kmp-default-4.5.5_26_k3.12.74_60.64.99-22.55.2.x86_64", "product_id": "xen-kmp-default-4.5.5_26_k3.12.74_60.64.99-22.55.2.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.5.5_26-22.55.2.x86_64", "product": { "name": "xen-libs-4.5.5_26-22.55.2.x86_64", "product_id": "xen-libs-4.5.5_26-22.55.2.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.5.5_26-22.55.2.x86_64", "product": { "name": "xen-libs-32bit-4.5.5_26-22.55.2.x86_64", "product_id": "xen-libs-32bit-4.5.5_26-22.55.2.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.5.5_26-22.55.2.x86_64", "product": { "name": "xen-tools-4.5.5_26-22.55.2.x86_64", "product_id": "xen-tools-4.5.5_26-22.55.2.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.5.5_26-22.55.2.x86_64", "product": { "name": "xen-tools-domU-4.5.5_26-22.55.2.x86_64", "product_id": "xen-tools-domU-4.5.5_26-22.55.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.5.5_26-22.55.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_26-22.55.2.x86_64" }, "product_reference": "xen-4.5.5_26-22.55.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.5.5_26-22.55.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_26-22.55.2.x86_64" }, "product_reference": "xen-doc-html-4.5.5_26-22.55.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.5.5_26_k3.12.74_60.64.99-22.55.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_26_k3.12.74_60.64.99-22.55.2.x86_64" }, "product_reference": "xen-kmp-default-4.5.5_26_k3.12.74_60.64.99-22.55.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.5.5_26-22.55.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_26-22.55.2.x86_64" }, "product_reference": "xen-libs-4.5.5_26-22.55.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.5.5_26-22.55.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_26-22.55.2.x86_64" }, "product_reference": "xen-libs-32bit-4.5.5_26-22.55.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.5.5_26-22.55.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_26-22.55.2.x86_64" }, "product_reference": "xen-tools-4.5.5_26-22.55.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.5.5_26-22.55.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_26-22.55.2.x86_64" }, "product_reference": "xen-tools-domU-4.5.5_26-22.55.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.5.5_26-22.55.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_26-22.55.2.x86_64" }, "product_reference": "xen-4.5.5_26-22.55.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.5.5_26-22.55.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_26-22.55.2.x86_64" }, "product_reference": "xen-doc-html-4.5.5_26-22.55.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.5.5_26_k3.12.74_60.64.99-22.55.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_26_k3.12.74_60.64.99-22.55.2.x86_64" }, "product_reference": "xen-kmp-default-4.5.5_26_k3.12.74_60.64.99-22.55.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.5.5_26-22.55.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_26-22.55.2.x86_64" }, "product_reference": "xen-libs-4.5.5_26-22.55.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.5.5_26-22.55.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_26-22.55.2.x86_64" }, "product_reference": "xen-libs-32bit-4.5.5_26-22.55.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.5.5_26-22.55.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_26-22.55.2.x86_64" }, "product_reference": "xen-tools-4.5.5_26-22.55.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.5.5_26-22.55.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_26-22.55.2.x86_64" }, "product_reference": "xen-tools-domU-4.5.5_26-22.55.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_26-22.55.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_26-22.55.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_26_k3.12.74_60.64.99-22.55.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_26-22.55.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_26-22.55.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_26-22.55.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_26-22.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_26-22.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_26-22.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_26_k3.12.74_60.64.99-22.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_26-22.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_26-22.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_26-22.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_26-22.55.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_26-22.55.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_26-22.55.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_26_k3.12.74_60.64.99-22.55.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_26-22.55.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_26-22.55.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_26-22.55.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_26-22.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_26-22.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_26-22.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_26_k3.12.74_60.64.99-22.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_26-22.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_26-22.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_26-22.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_26-22.55.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_26-22.55.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_26-22.55.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_26_k3.12.74_60.64.99-22.55.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_26-22.55.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_26-22.55.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_26-22.55.2.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_26-22.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_26-22.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_26-22.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_26_k3.12.74_60.64.99-22.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_26-22.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_26-22.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_26-22.55.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_26-22.55.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-22T14:31:48Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2349-1
Vulnerability from csaf_suse
Published
2018-08-16 06:05
Modified
2018-08-16 06:05
Summary
Security update for the Linux Kernel (Live Patch 32 for SLE 12)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 32 for SLE 12)
Description of the patch
This update for the Linux Kernel 3.12.61-52_122 fixes several issues.
The following security issues were fixed:
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
Patchnames
SUSE-SLE-SERVER-12-2018-1584
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 32 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_122 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).\n- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn\u0027t propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-1584", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2349-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2349-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182349-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2349-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004432.html" }, { "category": "self", "summary": "SUSE Bug 1097108", "url": "https://bugzilla.suse.com/1097108" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for the Linux Kernel (Live Patch 32 for SLE 12)", "tracking": { "current_release_date": "2018-08-16T06:05:37Z", "generator": { "date": "2018-08-16T06:05:37Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2349-1", "initial_release_date": "2018-08-16T06:05:37Z", "revision_history": [ { "date": "2018-08-16T06:05:37Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_122-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_122-default-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_122-default-7-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_122-xen-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_122-xen-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_122-xen-7-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:05:37Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:05:37Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2381-1
Vulnerability from csaf_suse
Published
2018-08-16 12:30
Modified
2018-08-16 12:30
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).
- CVE-2018-5391 aka 'FragmentSmack': A flaw in the IP packet reassembly could be used by remote attackers to consume lots of CPU time (bnc#1103097).
- CVE-2018-10876: A flaw was found in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image. (bnc#1099811)
- CVE-2018-10877: The ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image. (bnc#1099846)
- CVE-2018-10878: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image. (bnc#1099813)
- CVE-2018-10879: A flaw was found in the ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image. (bnc#1099844)
- CVE-2018-10880: Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service. (bnc#1099845)
- CVE-2018-10881: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099864)
- CVE-2018-10882: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image. (bnc#1099849)
- CVE-2018-10883: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099863)
The following non-security bugs were fixed:
- acpi / lpss: Only call pwm_add_table() for Bay Trail PWM if PMIC HRV is 2 (bsc#1051510).
- af_key: Always verify length of provided sadb_key (bsc#1051510).
- af_key: fix buffer overread in parse_exthdrs() (bsc#1051510).
- af_key: fix buffer overread in verify_address_len() (bsc#1051510).
- afs: Fix directory permissions check (bsc#1101828).
- agp: uninorth: make two functions static (bsc#1051510).
- alsa: emu10k1: add error handling for snd_ctl_add (bsc#1051510).
- alsa: emu10k1: Rate-limit error messages about page errors (bsc#1051510).
- alsa: fm801: add error handling for snd_ctl_add (bsc#1051510).
- alsa: usb-audio: Apply rate limit to warning messages in URB complete callback (bsc#1051510).
- arm64: Correct type for PUD macros (bsc#1103723).
- arm64: Disable unhandled signal log messages by default (bsc#1103724).
- arm64: kvm: fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1103725).
- arm64: mm: Fix set_memory_valid() declaration (bsc#1103726).
- arm64: perf: correct PMUVer probing (bsc#1103727).
- arm64: ptrace: Avoid setting compat FPR to garbage if get_user fails (bsc#1103728).
- arm64: spinlock: Fix theoretical trylock() A-B-A with LSE atomics (bsc#1103729).
- arm64: vdso: fix clock_getres for 4GiB-aligned res (bsc#1103730).
- arm: 8715/1: add a private asm/unaligned.h (bsc#1051510).
- arm: 8720/1: ensure dump_instr() checks addr_limit (bsc#1051510).
- arm: 8721/1: mm: dump: check hardware RO bit for LPAE (bsc#1051510).
- arm: 8722/1: mm: make STRICT_KERNEL_RWX effective for LPAE (bsc#1051510).
- arm: 8731/1: Fix csum_partial_copy_from_user() stack mismatch (bsc#1051510).
- arm: 8743/1: bL_switcher: add MODULE_LICENSE tag (bsc#1051510).
- arm: 8746/1: vfp: Go back to clearing vfp_current_hw_state[] (bsc#1051510).
- arm: 8748/1: mm: Define vdso_start, vdso_end as array (bsc#1051510).
- arm: 8753/1: decompressor: add a missing parameter to the addruart macro (bsc#1051510).
- arm: 8758/1: decompressor: restore r1 and r2 just before jumping to the kernel (bsc#1051510).
- arm: 8764/1: kgdb: fix NUMREGBYTES so that gdb_regs[] is the correct size (bsc#1051510).
- arm: 8769/1: kprobes: Fix to use get_kprobe_ctlblk after irq-disabed (bsc#1051510).
- arm: 8770/1: kprobes: Prohibit probing on optimized_callback (bsc#1051510).
- arm: 8771/1: kprobes: Prohibit kprobes on do_undefinstr (bsc#1051510).
- arm: 8772/1: kprobes: Prohibit kprobes on get_user functions (bsc#1051510).
- arm: AM33xx: PRM: Remove am33xx_pwrdm_read_prev_pwrst function (bsc#1051510).
- arm: amba: Fix race condition with driver_override (bsc#1051510).
- arm: amba: Fix wrong indentation in driver_override_store() (bsc#1051510).
- arm: amba: Make driver_override output consistent with other buses (bsc#1051510).
- arm: at91: do not select CONFIG_ARM_CPU_SUSPEND for old platforms (bsc#1051510).
- arm: avoid faulting on qemu (bsc#1051510).
- arm: BUG if jumping to usermode address in kernel mode (bsc#1051510).
- arm-ccn: perf: Prevent module unload while PMU is in use (bsc#1051510).
- arm: davinci: Add dma_mask to dm365's eDMA device (bsc#1051510).
- arm: davinci: board-da830-evm: fix GPIO lookup for MMC/SD (bsc#1051510).
- arm: davinci: board-da850-evm: fix GPIO lookup for MMC/SD (bsc#1051510).
- arm: davinci: board-da850-evm: fix WP pin polarity for MMC/SD (bsc#1051510).
- arm: davinci: board-dm355-evm: fix broken networking (bsc#1051510).
- arm: davinci: board-dm646x-evm: pass correct I2C adapter id for VPIF (bsc#1051510).
- arm: davinci: board-dm646x-evm: set VPIF capture card name (bsc#1051510).
- arm: davinci: board-omapl138-hawk: fix GPIO numbers for MMC/SD lookup (bsc#1051510).
- arm: davinci: dm646x: fix timer interrupt generation (bsc#1051510).
- arm: davinci: fix mmc entries in dm365's dma_slave_map (bsc#1051510).
- arm: davinci: fix the GPIO lookup for omapl138-hawk (bsc#1051510).
- arm: davinci: Use platform_device_register_full() to create pdev for dm365's eDMA (bsc#1051510).
- arm: DRA722: remove redundant definition of 1.0 device (bsc#1051510).
- arm: fix return value of parse_cpu_capacity (bsc#1051510).
- arm: kexec: fix failure to boot crash kernel (bsc#1051510).
- arm: kexec: fix kdump register saving on panic() (bsc#1051510).
- arm: keystone: fix platform_domain_notifier array overrun (bsc#1051510).
- arm: kvm: fix building with gcc-8 (bsc#1051510).
- arm: multi_v7_defconfig: Replace DRM_RCAR_HDMI by generic bridge options (bsc#1051510).
- arm: multi_v7_defconfig: Replace SND_SOC_RSRC_CARD by SND_SIMPLE_SCU_CARD (bsc#1051510).
- arm: mvebu: Fix broken PL310_ERRATA_753970 selects (bsc#1051510).
- arm: OMAP1: clock: Fix debugfs_create_*() usage (bsc#1051510).
- arm: OMAP2+: Fix SRAM virt to phys translation for save_secure_ram_context (bsc#1051510).
- arm: omap2: hide omap3_save_secure_ram on non-OMAP3 builds (bsc#1051510).
- arm: OMAP2+: omap_device: drop broken RPM status update from suspend_noirq (bsc#1051510).
- arm: OMAP2+: powerdomain: use raw_smp_processor_id() for trace (bsc#1051510).
- arm: OMAP2+: timer: fix a kmemleak caused in omap_get_timer_dt (bsc#1051510).
- arm: OMAP3: Fix prm wake interrupt for resume (bsc#1051510).
- arm: OMAP3: hwmod_data: add missing module_offs for MMC3 (bsc#1051510).
- arm: OMAP3+: PRM: fix of_irq_get() result check (bsc#1051510).
- arm: OMAP4+: PRM: fix of_irq_get() result checks (bsc#1051510).
- arm: OMAP: Fix dmtimer init for omap1 (bsc#1051510).
- arm: OMAP: Fix SRAM W+X mapping (bsc#1051510).
- arm: orion5x: Revert commit 4904dbda41c8 (bsc#1051510).
- arm: orion: fix orion_ge00_switch_board_info initialization (bsc#1051510).
- arm: pxa: select both FB and FB_W100 for eseries (bsc#1051510).
- arm: pxa/tosa-bt: add MODULE_LICENSE tag (bsc#1051510).
- arm: remove wrong CONFIG_PROC_SYSCTL ifdef (bsc#1051510).
- arm: s3c24xx: Fix NAND ECC mode for mini2440 board (bsc#1051510).
- arm: shmobile: defconfig: Enable missing PCIE_RCAR dependency (bsc#1051510).
- arm: shmobile: defconfig: Replace DRM_RCAR_HDMI by generic bridge options (bsc#1051510).
- arm: shmobile: defconfig: Replace SND_SOC_RSRC_CARD by SND_SIMPLE_SCU_CARD (bsc#1051510).
- arm: shmobile: defconfig: Replace USB_XHCI_RCAR by USB_XHCI_PLATFORM (bsc#1051510).
- arm: shmobile: rcar-gen2: Fix deadlock in regulator quirk (bsc#1051510).
- arm: socfpga_defconfig: Remove QSPI Sector 4K size force (bsc#1051510).
- arm: spear13xx: Fix dmas cells (bsc#1051510).
- arm: sunxi_defconfig: Enable CMA (bsc#1051510).
- arm: sunxi: fix the core number of V3s in sunxi README (bsc#1051510).
- asoc: dpcm: fix BE dai not hw_free and shutdown (bsc#1051510).
- asoc: topology: Add missing clock gating parameter when parsing hw_configs (bsc#1051510).
- asoc: topology: Fix bclk and fsync inversion in set_link_hw_format() (bsc#1051510).
- ata: do not schedule hot plug if it is a sas host ().
- ath: Add regulatory mapping for APL13_WORLD (bsc#1051510).
- ath: Add regulatory mapping for APL2_FCCA (bsc#1051510).
- ath: Add regulatory mapping for Bahamas (bsc#1051510).
- ath: Add regulatory mapping for Bermuda (bsc#1051510).
- ath: Add regulatory mapping for ETSI8_WORLD (bsc#1051510).
- ath: Add regulatory mapping for FCC3_ETSIC (bsc#1051510).
- ath: Add regulatory mapping for Serbia (bsc#1051510).
- ath: Add regulatory mapping for Tanzania (bsc#1051510).
- ath: Add regulatory mapping for Uganda (bsc#1051510).
- audit: fix potential null dereference 'context->module.name' (bsc#1051510).
- backlight: pwm_bl: Do not use GPIOF_* with gpiod_get_direction (bsc#1051510).
- bdi: Move cgroup bdi_writeback to a dedicated low concurrency workqueue (bsc#1101867).
- befs_lookup(): use d_splice_alias() (bsc#1101844).
- block: Fix transfer when chunk sectors exceeds max (bsc#1101874).
- bluetooth: btusb: Add a new Realtek 8723DE ID 2ff8:b011 (bsc#1051510).
- bluetooth: btusb: add ID for LiteOn 04ca:301a (bsc#1051510).
- bluetooth: hci_qca: Fix 'Sleep inside atomic section' warning (bsc#1051510).
- branch-check: fix long->int truncation when profiling branches (bsc#1101116,).
- brcmfmac: Add support for bcm43364 wireless chipset (bsc#1051510).
- cachefiles: Fix missing clear of the CACHEFILES_OBJECT_ACTIVE flag (bsc#1099858).
- cachefiles: Fix refcounting bug in backing-file read monitoring (bsc#1099858).
- cachefiles: Wait rather than BUG'ing on 'Unexpected object collision' (bsc#1099858).
- can: dev: increase bus-off message severity (bsc#1051510).
- can: ems_usb: Fix memory leak on ems_usb_disconnect() (bsc#1051510).
- can: m_can: change comparison to bitshift when dealing with a mask (bsc#1051510).
- cdrom: do not call check_disk_change() inside cdrom_open() (bsc#1101872).
- clk: at91: fix clk-generated compilation (bsc#1051510).
- clk: renesas: cpg-mssr: Stop using printk format %pCr (bsc#1051510).
- coccinelle: fix parallel build with CHECK=scripts/coccicheck (bsc#1051510).
- compiler.h: enable builtin overflow checkers and add fallback code (bsc#1101116,).
- cpufreq: intel_pstate: Limit the scope of HWP dynamic boost platforms (bsc#1066110).
- cpu/hotplug: Make bringup/teardown of smp threads symmetric (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- crypto: authenc - do not leak pointers to authenc keys (bsc#1051510).
- crypto: authencesn - do not leak pointers to authenc keys (bsc#1051510).
- crypto: padlock-aes - Fix Nano workaround data corruption (bsc#1051510).
- delayacct: fix crash in delayacct_blkio_end() after delayacct init failure (bsc#1104066).
- dm: add writecache target (bsc#1101116,).
- dm: prevent DAX mounts if not supported (bsc#1103917).
- dm writecache: support optional offset for start of device (bsc#1101116,).
- dm writecache: use 2-factor allocator arguments (bsc#1101116,).
- doc: Add vendor prefix for Kieback & Peter GmbH (bsc#1051510).
- drivers: soc: sunxi: fix error processing on base address when claiming (bsc#1051510).
- drm: Add DP PSR2 sink enable bit (bsc#1051510).
- drm/amdgpu: Remove VRAM from shared bo domains (bsc#1051510).
- drm/atomic: Check old_plane_state->crtc in drm_atomic_helper_async_check() (bsc#1051510).
- drm/atomic: Handling the case when setting old crtc for plane (bsc#1051510).
- drm/atomic-helper: Drop plane->fb references only for drm_atomic_helper_shutdown() (bsc#1051510).
- drm/atomic: Initialize variables in drm_atomic_helper_async_check() to make gcc happy (bsc#1051510).
- drm/atomic: Make async plane update checks work as intended, v2 (bsc#1051510).
- drm/atomic: Make atomic helper track newly assigned planes correctly, v2 (bsc#1051510).
- drm/atomic: Make atomic iterators less surprising (bsc#1051510).
- drm/dp/mst: Fix off-by-one typo when dump payload table (bsc#1051510).
- drm/gma500: fix psb_intel_lvds_mode_valid()'s return type (bsc#1051510).
- drm/nouveau/fifo/gk104-: poll for runlist update completion (bsc#1051510).
- drm/radeon: fix mode_valid's return type (bsc#1051510).
- drm: re-enable error handling (bsc#1051510).
- drm/vc4: Reset ->{x, y}_scaling[1] when dealing with uniplanar formats (bsc#1051510).
- Enable / support pinctrl-lewisburg ()
- ext2: fix a block leak (bsc#1101875).
- ext4: add more mount time checks of the superblock (bsc#1101900).
- ext4: bubble errors from ext4_find_inline_data_nolock() up to ext4_iget() (bsc#1101896).
- ext4: check superblock mapped prior to committing (bsc#1101902).
- ext4: do not update s_last_mounted of a frozen fs (bsc#1101841).
- ext4: factor out helper ext4_sample_last_mounted() (bsc#1101841).
- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).
- ext4: fix fencepost error in check for inode count overflow during resize (bsc#1101853).
- ext4: include the illegal physical block in the bad map ext4_error msg (bsc#1101903).
- ext4: report delalloc reserve as non-free in statfs for project quota (bsc#1101843).
- ext4: update mtime in ext4_punch_hole even if no blocks are released (bsc#1101895).
- f2fs: call unlock_new_inode() before d_instantiate() (bsc#1101837).
- fix io_destroy()/aio_complete() race (bsc#1101852).
- Force log to disk before reading the AGF during a fstrim (bsc#1101893).
- fs: allow per-device dax status checking for filesystems (bsc#1103917).
- fscache: Allow cancelled operations to be enqueued (bsc#1099858).
- fscache: Fix hanging wait on page discarded by writeback (bsc#1101885).
- fscache: Fix reference overput in fscache_attach_object() error handling (bsc#1099858).
- fs: clear writeback errors in inode_init_always (bsc#1101882).
- fs: do not scan the inode cache before SB_BORN is set (bsc#1101883).
- genirq: Check __free_irq() return value for NULL (bsc#1103517).
- hid: hid-plantronics: Re-resend Update to map button for PTT products (bsc#1051510).
- hid: i2c-hid: check if device is there before really probing (bsc#1051510).
- hippi: Fix a Fix a possible sleep-in-atomic bug in rr_close (bsc#1051510).
- hv_netvsc: Ensure correct teardown message sequence order ().
- hv/netvsc: fix handling of fallback to single queue mode ().
- hv_netvsc: Fix net device attach on older Windows hosts ().
- hv_netvsc: set master device (bsc#1051979).
- hv_netvsc: Split netvsc_revoke_buf() and netvsc_teardown_gpadl() ().
- hv_netvsc: split sub-channel setup into async and sync ().
- hv_netvsc: Use Windows version instead of NVSP version on GPAD teardown ().
- ibmasm: do not write out of bounds in read handler (bsc#1051510).
- ibmvnic: Remove code to request error information (bsc#1104174).
- ibmvnic: Revise RX/TX queue error messages (bsc#1101331).
- ibmvnic: Update firmware error reporting with cause string (bsc#1104174).
- input: elan_i2c - add ACPI ID for lenovo ideapad 330 (bsc#1051510).
- input: elan_i2c - add another ACPI ID for Lenovo Ideapad 330-15AST (bsc#1051510).
- input: i8042 - add Lenovo LaVie Z to the i8042 reset list (bsc#1051510).
- irqchip: brcmstb-l2: Define an irq_pm_shutdown function (bsc#1051510).
- irqchip/gic: Take lock when updating irq type (bsc#1051510).
- irqchip/gic-v3: Change pr_debug message to pr_devel (bsc#1051510).
- irqchip/gic-v3: Fix the driver probe() fail due to disabled GICC entry (bsc#1051510).
- irqchip/gic-v3: Ignore disabled ITS nodes (bsc#1051510).
- irqchip/gic-v3: Use wmb() instead of smb_wmb() in gic_raise_softirq() (bsc#1051510).
- irqchip/qcom: Fix check for spurious interrupts (bsc#1051510).
- irqchip/qcom: Fix u32 comparison with value less than zero (bsc#1051510).
- isofs: fix potential memory leak in mount option parsing (bsc#1101887).
- iwlwifi: add more card IDs for 9000 series (bsc#1051510).
- iwlwifi: pcie: fix race in Rx buffer allocator (bsc#1051510).
- jump_label: Fix concurrent static_key_enable/disable() (bsc#1089343).
- jump_label: Provide hotplug context variants (bsc#1089343).
- jump_label: Reorder hotplug lock and jump_label_lock (bsc#1089343).
- kabi protect bdev_dax_supported (bsc#1103917).
- kabi protect struct ccw_device_private (bsc#1103421).
- kabi/severities: do not complain on hisi_sas internal changes ().
- kabi/severities: ignore x86_kvm_ops; lttng-modules would have to be adjusted in case they depend on this particular change
- kbuild: add '-fno-stack-check' to kernel build options (bsc#1051510).
- kbuild: Handle builtin dtb file names containing hyphens (bsc#1051510).
- kbuild: pkg: use --transform option to prefix paths in tar (bsc#1051510).
- kconfig: display recursive dependency resolution hint just once (bsc#1051510).
- kmemleak: add scheduling point to kmemleak_scan() (bsc#1051510).
- kvm: SVM: Add pause filter threshold ().
- kvm: SVM: Implement pause loop exit logic in SVM ().
- kvm: VMX: Bring the common code to header file ().
- kvm: VMX: Fix the module parameters for vmx ().
- kvm: VMX: Remove ple_window_actual_max ().
- libata: add refcounting to ata_host (git-fixes).
- libata: ensure host is free'd on error exit paths (git-fixes).
- libnvdimm, dimm: fix dpa reservation vs uninitialized label area (git-fixes).
- linvdimm, pmem: Preserve read-only setting for pmem devices (git-fixes).
- media: media-device: fix ioctl function types (bsc#1051510).
- media: rcar_jpu: Add missing clk_disable_unprepare() on error in jpu_open() (bsc#1051510).
- media: saa7164: Fix driver name in debug output (bsc#1051510).
- media: si470x: fix __be16 annotations (bsc#1051510).
- media: siano: get rid of __le32/__le16 cast warnings (bsc#1051510).
- media: tw686x: Fix incorrect vb2_mem_ops GFP flags (bsc#1051510).
- mfd: cros_ec: Fail early if we cannot identify the EC (bsc#1051510).
- mfd: fsl-imx25: Clean up irq settings during removal (bsc#1051510).
- mfd: mxs-lradc: Fix error handling in mxs_lradc_probe() (bsc#1051510).
- misc: pci_endpoint_test: Avoid triggering a BUG() (bsc#1051510).
- mmc: dw_mmc: update actual clock for mmc debugfs (bsc#1051510).
- mmc: pwrseq: Use kmalloc_array instead of stack VLA (bsc#1051510).
- mm: fix __gup_device_huge vs unmap (bsc#1101839).
- mm/kmemleak.c: make cond_resched() rate-limiting more efficient (bsc#1051510).
- mwifiex: correct histogram data with appropriate index (bsc#1051510).
- mwifiex: handle race during mwifiex_usb_disconnect (bsc#1051510).
- nohz: Fix local_timer_softirq_pending() (bsc#1051510).
- nvme: ensure forward progress during Admin passthru (git-fixes).
- nvme-fabrics: Ignore nr_io_queues option for discovery controllers (bsc#1102633).
- nvme: fixup crash on failed discovery (bsc#1103920).
- nvme.h: fixup ANA group descriptor format (bsc#1104111).
- nvme: use hw qid in trace events (bsc#1102633).
- orangefs: report attributes_mask and attributes for statx (bsc#1101832).
- orangefs: set i_size on new symlink (bsc#1101845).
- overflow.h: Add allocation size calculation helpers (bsc#1101116,).
- pci: pciehp: Assume NoCompl+ for Thunderbolt ports (bsc#1051510).
- pci: pciehp: Request control of native hotplug only if supported (bsc#1051510).
- pci: Prevent sysfs disable of device while driver is attached (bsc#1051510).
- pinctrl: at91-pio4: add missing of_node_put (bsc#1051510).
- pinctrl: intel: Add Intel Lewisburg GPIO support ().
- pinctrl: nand: meson-gxl: fix missing data pins (bsc#1051510).
- pmem: only set QUEUE_FLAG_DAX for fsdax mode (bsc#1103917).
- qed*: Add link change count value to ethtool statistics display (bsc#1086314).
- qed: Add qed APIs for PHY module query (bsc#1086314 ).
- qed: Add srq core support for RoCE and iWARP (bsc#1086314 ).
- qede: Add driver callbacks for eeprom module query (bsc#1086314 ).
- qed: fix spelling mistake 'successffuly' -> 'successfully' (bsc#1086314).
- qed: Make some functions static (bsc#1086314).
- qed: remove redundant functions qed_get_cm_pq_idx_rl (bsc#1086314).
- qed: remove redundant functions qed_set_gft_event_id_cm_hdr (bsc#1086314).
- qed: remove redundant pointer 'name' (bsc#1086314).
- qed: use dma_zalloc_coherent instead of allocator/memset (bsc#1086314).
- qed*: Utilize FW 8.37.2.0 (bsc#1086314).
- RDMA/qedr: Fix NULL pointer dereference when running over iWARP without RDMA-CM (bsc#1086314).
- RDMA/qedr: fix spelling mistake: 'adrresses' -> 'addresses' (bsc#1086314).
- RDMA/qedr: fix spelling mistake: 'failes' -> 'fails' (bsc#1086314).
- regulator: pfuze100: add .is_enable() for pfuze100_swb_regulator_ops (bsc#1051510).
- reiserfs: fix buffer overflow with long warning messages (bsc#1101847).
- Revert 'drm/nouveau/drm/therm/fan: add a fallback if no fan control is specified in the vbios' (bsc#1103356).
- s390/cio: clear timer when terminating driver I/O (bsc#1103421).
- s390/cio: fix return code after missing interrupt (bsc#1103421).
- s390/dasd: fix handling of internal requests (bsc#1103421).
- s390/dasd: fix wrongly assigned configuration data (bsc#1103421).
- s390/dasd: prevent prefix I/O error (bsc#1103421).
- s390/eadm: fix CONFIG_BLOCK include dependency (bsc#1103421).
- s390/ipl: ensure loadparm valid flag is set (bsc#1103421).
- s390/pci: do not require AIS facility (bsc#1103421).
- s390/qdio: do not release memory in qdio_setup_irq() (bsc#1103421).
- sc16is7xx: Check for an error when the clock is enabled (bsc#1051510).
- sched/fair: Consider RT/IRQ pressure in capacity_spare_wake() (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Fix find_idlest_group() when local group is not allowed (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Fix usage of find_idlest_group() when no groups are allowed (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Fix usage of find_idlest_group() when the local group is idlest (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Move select_task_rq_fair() slow-path into its own function (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Remove impossible condition from find_idlest_group_cpu() (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Remove unnecessary comparison with -1 (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Spare idle load balancing on nohz_full CPUs (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Use 'unsigned long' for utilization, consistently (bnc#1101669 optimise numa balancing for fast migrate).
- sched/smt: Update sched_smt_present at runtime (bsc#1089343).
- scsi: ata: enhance the definition of SET MAX feature field value ().
- scsi: hisi_sas: add an mechanism to do reset work synchronously ().
- scsi: hisi_sas: add check of device in hisi_sas_task_exec() ().
- scsi: hisi_sas: add internal abort dev in some places ().
- scsi: hisi_sas: Add LED feature for v3 hw ().
- scsi: hisi_sas: add RAS feature for v3 hw ().
- scsi: hisi_sas: add readl poll timeout helper wrappers ().
- scsi: hisi_sas: Add some checks to avoid free'ing a sas_task twice ().
- scsi: hisi_sas: add some print to enhance debugging ().
- scsi: hisi_sas: Add v2 hw force PHY function for internal ATA command ().
- scsi: hisi_sas: add v2 hw port AXI error handling support ().
- scsi: hisi_sas: add v3 hw MODULE_DEVICE_TABLE() ().
- scsi: hisi_sas: add v3 hw suspend and resume ().
- scsi: hisi_sas: allocate slot buffer earlier ().
- scsi: hisi_sas: Change common allocation mode of device id ().
- scsi: hisi_sas: Change frame type for SET MAX commands ().
- scsi: hisi_sas: change ncq process for v3 hw ().
- scsi: hisi_sas: change slot index allocation mode ().
- scsi: hisi_sas: check host frozen before calling 'done' function ().
- scsi: hisi_sas: check IPTT is valid before using it for v3 hw ().
- scsi: hisi_sas: check sas_dev gone earlier in hisi_sas_abort_task() ().
- scsi: hisi_sas: Code cleanup and minor bug fixes ().
- scsi: hisi_sas: config ATA de-reset as an constrained command for v3 hw ().
- scsi: hisi_sas: consolidate command check in hisi_sas_get_ata_protocol() ().
- scsi: hisi_sas: Create a scsi_host_template per HW module ().
- scsi: hisi_sas: delete timer when removing hisi_sas driver ().
- scsi: hisi_sas: do link reset for some CHL_INT2 ints ().
- scsi: hisi_sas: Do not lock DQ for complete task sending ().
- scsi: hisi_sas: dt-bindings: add an property of signal attenuation ().
- scsi: hisi_sas: fix a bug in hisi_sas_dev_gone() ().
- scsi: hisi_sas: fix a typo in hisi_sas_task_prep() ().
- scsi: hisi_sas: fix dma_unmap_sg() parameter ().
- scsi: hisi_sas: fix PI memory size ().
- scsi: hisi_sas: fix return value of hisi_sas_task_prep() ().
- scsi: hisi_sas: Fix return value when get_free_slot() failed ().
- scsi: hisi_sas: fix SAS_QUEUE_FULL problem while running IO ().
- scsi: hisi_sas: fix the issue of link rate inconsistency ().
- scsi: hisi_sas: fix the issue of setting linkrate register ().
- scsi: hisi_sas: improve int_chnl_int_v2_hw() consistency with v3 hw ().
- scsi: hisi_sas: Include TMF elements in struct hisi_sas_slot ().
- scsi: hisi_sas: increase timer expire of internal abort task ().
- scsi: hisi_sas: Init disks after controller reset ().
- scsi: hisi_sas: initialize dq spinlock before use ().
- scsi: hisi_sas: Introduce hisi_sas_phy_set_linkrate() ().
- scsi: hisi_sas: judge result of internal abort ().
- scsi: hisi_sas: make local symbol host_attrs static ().
- scsi: hisi_sas: make return type of prep functions void ().
- scsi: hisi_sas: make SAS address of SATA disks unique ().
- scsi: hisi_sas: Mark PHY as in reset for nexus reset ().
- scsi: hisi_sas: modify hisi_sas_dev_gone() for reset ().
- scsi: hisi_sas: modify some register config for hip08 ().
- scsi: hisi_sas: optimise port id refresh function ().
- scsi: hisi_sas: optimise the usage of DQ locking ().
- scsi: hisi_sas: print device id for errors ().
- scsi: hisi_sas: re-add the lldd_port_deformed() ().
- scsi: hisi_sas: relocate clearing ITCT and freeing device ().
- scsi: hisi_sas: relocate smp sg map ().
- scsi: hisi_sas: Remove depends on HAS_DMA in case of platform dependency ().
- scsi: hisi_sas: remove redundant handling to event95 for v3 ().
- scsi: hisi_sas: remove some unneeded structure members ().
- scsi: hisi_sas: remove unused variable hisi_sas_devices.running_req ().
- scsi: hisi_sas: Reset disks when discovered ().
- scsi: hisi_sas: some optimizations of host controller reset ().
- scsi: hisi_sas: stop controller timer for reset ().
- scsi: hisi_sas: support the property of signal attenuation for v2 hw ().
- scsi: hisi_sas: Terminate STP reject quickly for v2 hw ().
- scsi: hisi_sas: Try wait commands before before controller reset ().
- scsi: hisi_sas: update PHY linkrate after a controller reset ().
- scsi: hisi_sas: update RAS feature for later revision of v3 HW ().
- scsi: hisi_sas: use an general way to delay PHY work ().
- scsi: hisi_sas: Use device lock to protect slot alloc/free ().
- scsi: hisi_sas: use dma_zalloc_coherent() ().
- scsi: hisi_sas: workaround a v3 hw hilink bug ().
- scsi: libsas: defer ata device eh commands to libata ().
- scsi: lpfc: Add Buffer overflow check, when nvme_info larger than PAGE_SIZE (bsc#1102658).
- scsi: lpfc: Correct LCB ACCept payload (bsc#1102658).
- scsi: lpfc: devloss timeout race condition caused null pointer reference (bsc#1102658).
- scsi: lpfc: Fix abort error path for NVMET (bsc#1102658).
- scsi: lpfc: Fix driver crash when re-registering NVME rports (bsc#1102658).
- scsi: lpfc: Fix driver not setting dpp bits correctly in doorbell word (bsc#1102658).
- scsi: lpfc: Fix ELS abort on SLI-3 adapters (bsc#1102658).
- scsi: lpfc: Fix list corruption on the completion queue (bsc#1102658).
- scsi: lpfc: Fix NVME Target crash in defer rcv logic (bsc#1102658).
- scsi: lpfc: Fix panic if driver unloaded when port is offline (bsc#1102658).
- scsi: lpfc: Fix sysfs Speed value on CNA ports (bsc#1102658).
- scsi: lpfc: Limit tracking of tgt queue depth in fast path (bsc#1102658).
- scsi: lpfc: Make PBDE optimizations configurable (bsc#1102658).
- scsi: lpfc: Remove lpfc_enable_pbde as module parameter (bsc#1102658).
- scsi: lpfc: Revise copyright for new company language (bsc#1102658).
- scsi: lpfc: Support duration field in Link Cable Beacon V1 command (bsc#1102658).
- scsi: lpfc: update driver version to 12.0.0.5 (bsc#1102658).
- scsi: lpfc: update driver version to 12.0.0.6 (bsc#1102658).
- scsi: qla2xxx: Avoid double completion of abort command (git-fixes).
- scsi: qla2xxx: Fix driver unload by shutting down chip (git-fixes).
- scsi: qla2xxx: Fix NPIV deletion by calling wait_for_sess_deletion (git-fixes).
- scsi: qla2xxx: Fix NULL pointer dereference for fcport search (git-fixes).
- scsi: qla2xxx: Fix unintialized List head crash (git-fixes).
- scsi: qla2xxx: Return error when TMF returns (git-fixes).
- scsi: smartpqi: add in new supported controllers (bsc#1086274).
- scsi: smartpqi: add inspur advantech ids (bsc#1086274).
- scsi: smartpqi: bump driver version to 1.1.4-130 (bsc#1086274).
- scsi: smartpqi: fix critical ARM issue reading PQI index registers (bsc#1086274).
- scsi: smartpqi: improve error checking for sync requests (bsc#1086274).
- scsi: smartpqi: improve handling for sync requests (bsc#1086274).
- scsi: smartpqi: update driver version (bsc#1086274).
- scsi: smartpqi: workaround fw bug for oq deletion (bsc#1086274).
- sctp: fix the issue that pathmtu may be set lower than MINSEGMENT (git-fixes).
- sctp: introduce sctp_dst_mtu (git-fixes).
- soc: bcm2835: Make !RASPBERRYPI_FIRMWARE dummies return failure (bsc#1051510).
- soc: bcm: raspberrypi-power: Fix use of __packed (bsc#1051510).
- soc: imx: gpc: de-register power domains only if initialized (bsc#1051510).
- soc: imx: gpc: restrict register range for regmap access (bsc#1051510).
- soc: imx: gpcv2: correct PGC offset (bsc#1051510).
- soc: imx: gpcv2: Do not pass static memory as platform data (bsc#1051510).
- soc: imx: gpcv2: fix regulator deferred probe (bsc#1051510).
- soc: mediatek: pwrap: fix compiler errors (bsc#1051510).
- soc: qcom: wcnss_ctrl: Fix increment in NV upload (bsc#1051510).
- soc: rockchip: power-domain: Fix wrong value when power up pd with writemask (bsc#1051510).
- soc/tegra: Fix bad of_node_put() in powergate init (bsc#1051510).
- soc/tegra: flowctrl: Fix error handling (bsc#1051510).
- soc: ti: ti_sci_pm_domains: Populate name for genpd (bsc#1051510).
- soc: zte: Restrict SOC_ZTE to ARCH_ZX or COMPILE_TEST (bsc#1051510).
- spi: bcm2835aux: ensure interrupts are enabled for shared handler (bsc#1051510).
- spi/bcm63xx-hspi: Enable the clock before calling clk_get_rate() (bsc#1051510).
- spi: bcm-qspi: Always read and set BSPI_MAST_N_BOOT_CTRL (bsc#1051510).
- spi: bcm-qspi: Avoid setting MSPI_CDRAM_PCS for spi-nor master (bsc#1051510).
- spi: cadence: Add usleep_range() for cdns_spi_fill_tx_fifo() (bsc#1051510).
- spi: pxa2xx: Allow 64-bit DMA (bsc#1051510).
- spi: pxa2xx: check clk_prepare_enable() return value (bsc#1051510).
- sr: pass down correctly sized SCSI sense buffer (git-fixes).
- staging: ks7010: Use constants from ieee80211_eid instead of literal ints (bsc#1051510).
- staging: speakup: fix wraparound in uaccess length check (bsc#1051510).
- supported.conf: add drivers/md/dm-writecache
- sysrq : fix Show Regs call trace on ARM (bsc#1051510).
- thermal: exynos: fix setting rising_threshold for Exynos5433 (bsc#1051510).
- tty: Fix data race in tty_insert_flip_string_fixed_flag (bsc#1051510).
- typec: tcpm: Fix a msecs vs jiffies bug (bsc#1100132).
- udf: Detect incorrect directory size (bsc#1101891).
- udf: Provide saner default for invalid uid / gid (bsc#1101890).
- Update config files to add CONFIG_DM_WRITECACHE=m
- Update patches.arch/KVM-PPC-Check-if-IOMMU-page-is-contained-in-the-pinn.patch (bsc#1077761, git-fixes, bsc#1103948, bsc#1103949).
- usb: hub: Do not wait for connect state at resume for powered-off ports (bsc#1051510).
- usbip: usbip_detach: Fix memory, udev context and udev leak (bsc#1051510).
- vfs: add the sb_start_intwrite_trylock() helper (bsc#1101841).
- virtio_balloon: fix another race between migration and ballooning (bsc#1051510).
- wlcore: sdio: check for valid platform device data before suspend (bsc#1051510).
- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/KVM/VMX: Add module argument for L1TF mitigation.
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- x86: Treat R_X86_64_PLT32 as R_X86_64_PC32 (binutils_2.31).
- xfs: catch inode allocation state mismatch corruption (bsc#1104211).
- xfs: prevent creating negative-sized file via INSERT_RANGE (bsc#1101833).
Patchnames
SUSE-SLE-Module-Live-Patching-15-2018-1614
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).\n- CVE-2018-5391 aka \u0027FragmentSmack\u0027: A flaw in the IP packet reassembly could be used by remote attackers to consume lots of CPU time (bnc#1103097).\n- CVE-2018-10876: A flaw was found in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image. (bnc#1099811)\n- CVE-2018-10877: The ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image. (bnc#1099846)\n- CVE-2018-10878: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image. (bnc#1099813)\n- CVE-2018-10879: A flaw was found in the ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image. (bnc#1099844)\n- CVE-2018-10880: Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service. (bnc#1099845)\n- CVE-2018-10881: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099864)\n- CVE-2018-10882: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image. (bnc#1099849)\n- CVE-2018-10883: A flaw was found in the ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image. (bnc#1099863)\n\nThe following non-security bugs were fixed:\n\n- acpi / lpss: Only call pwm_add_table() for Bay Trail PWM if PMIC HRV is 2 (bsc#1051510).\n- af_key: Always verify length of provided sadb_key (bsc#1051510).\n- af_key: fix buffer overread in parse_exthdrs() (bsc#1051510).\n- af_key: fix buffer overread in verify_address_len() (bsc#1051510).\n- afs: Fix directory permissions check (bsc#1101828).\n- agp: uninorth: make two functions static (bsc#1051510).\n- alsa: emu10k1: add error handling for snd_ctl_add (bsc#1051510).\n- alsa: emu10k1: Rate-limit error messages about page errors (bsc#1051510).\n- alsa: fm801: add error handling for snd_ctl_add (bsc#1051510).\n- alsa: usb-audio: Apply rate limit to warning messages in URB complete callback (bsc#1051510).\n- arm64: Correct type for PUD macros (bsc#1103723).\n- arm64: Disable unhandled signal log messages by default (bsc#1103724).\n- arm64: kvm: fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1103725).\n- arm64: mm: Fix set_memory_valid() declaration (bsc#1103726).\n- arm64: perf: correct PMUVer probing (bsc#1103727).\n- arm64: ptrace: Avoid setting compat FPR to garbage if get_user fails (bsc#1103728).\n- arm64: spinlock: Fix theoretical trylock() A-B-A with LSE atomics (bsc#1103729).\n- arm64: vdso: fix clock_getres for 4GiB-aligned res (bsc#1103730).\n- arm: 8715/1: add a private asm/unaligned.h (bsc#1051510).\n- arm: 8720/1: ensure dump_instr() checks addr_limit (bsc#1051510).\n- arm: 8721/1: mm: dump: check hardware RO bit for LPAE (bsc#1051510).\n- arm: 8722/1: mm: make STRICT_KERNEL_RWX effective for LPAE (bsc#1051510).\n- arm: 8731/1: Fix csum_partial_copy_from_user() stack mismatch (bsc#1051510).\n- arm: 8743/1: bL_switcher: add MODULE_LICENSE tag (bsc#1051510).\n- arm: 8746/1: vfp: Go back to clearing vfp_current_hw_state[] (bsc#1051510).\n- arm: 8748/1: mm: Define vdso_start, vdso_end as array (bsc#1051510).\n- arm: 8753/1: decompressor: add a missing parameter to the addruart macro (bsc#1051510).\n- arm: 8758/1: decompressor: restore r1 and r2 just before jumping to the kernel (bsc#1051510).\n- arm: 8764/1: kgdb: fix NUMREGBYTES so that gdb_regs[] is the correct size (bsc#1051510).\n- arm: 8769/1: kprobes: Fix to use get_kprobe_ctlblk after irq-disabed (bsc#1051510).\n- arm: 8770/1: kprobes: Prohibit probing on optimized_callback (bsc#1051510).\n- arm: 8771/1: kprobes: Prohibit kprobes on do_undefinstr (bsc#1051510).\n- arm: 8772/1: kprobes: Prohibit kprobes on get_user functions (bsc#1051510).\n- arm: AM33xx: PRM: Remove am33xx_pwrdm_read_prev_pwrst function (bsc#1051510).\n- arm: amba: Fix race condition with driver_override (bsc#1051510).\n- arm: amba: Fix wrong indentation in driver_override_store() (bsc#1051510).\n- arm: amba: Make driver_override output consistent with other buses (bsc#1051510).\n- arm: at91: do not select CONFIG_ARM_CPU_SUSPEND for old platforms (bsc#1051510).\n- arm: avoid faulting on qemu (bsc#1051510).\n- arm: BUG if jumping to usermode address in kernel mode (bsc#1051510).\n- arm-ccn: perf: Prevent module unload while PMU is in use (bsc#1051510).\n- arm: davinci: Add dma_mask to dm365\u0027s eDMA device (bsc#1051510).\n- arm: davinci: board-da830-evm: fix GPIO lookup for MMC/SD (bsc#1051510).\n- arm: davinci: board-da850-evm: fix GPIO lookup for MMC/SD (bsc#1051510).\n- arm: davinci: board-da850-evm: fix WP pin polarity for MMC/SD (bsc#1051510).\n- arm: davinci: board-dm355-evm: fix broken networking (bsc#1051510).\n- arm: davinci: board-dm646x-evm: pass correct I2C adapter id for VPIF (bsc#1051510).\n- arm: davinci: board-dm646x-evm: set VPIF capture card name (bsc#1051510).\n- arm: davinci: board-omapl138-hawk: fix GPIO numbers for MMC/SD lookup (bsc#1051510).\n- arm: davinci: dm646x: fix timer interrupt generation (bsc#1051510).\n- arm: davinci: fix mmc entries in dm365\u0027s dma_slave_map (bsc#1051510).\n- arm: davinci: fix the GPIO lookup for omapl138-hawk (bsc#1051510).\n- arm: davinci: Use platform_device_register_full() to create pdev for dm365\u0027s eDMA (bsc#1051510).\n- arm: DRA722: remove redundant definition of 1.0 device (bsc#1051510).\n- arm: fix return value of parse_cpu_capacity (bsc#1051510).\n- arm: kexec: fix failure to boot crash kernel (bsc#1051510).\n- arm: kexec: fix kdump register saving on panic() (bsc#1051510).\n- arm: keystone: fix platform_domain_notifier array overrun (bsc#1051510).\n- arm: kvm: fix building with gcc-8 (bsc#1051510).\n- arm: multi_v7_defconfig: Replace DRM_RCAR_HDMI by generic bridge options (bsc#1051510).\n- arm: multi_v7_defconfig: Replace SND_SOC_RSRC_CARD by SND_SIMPLE_SCU_CARD (bsc#1051510).\n- arm: mvebu: Fix broken PL310_ERRATA_753970 selects (bsc#1051510).\n- arm: OMAP1: clock: Fix debugfs_create_*() usage (bsc#1051510).\n- arm: OMAP2+: Fix SRAM virt to phys translation for save_secure_ram_context (bsc#1051510).\n- arm: omap2: hide omap3_save_secure_ram on non-OMAP3 builds (bsc#1051510).\n- arm: OMAP2+: omap_device: drop broken RPM status update from suspend_noirq (bsc#1051510).\n- arm: OMAP2+: powerdomain: use raw_smp_processor_id() for trace (bsc#1051510).\n- arm: OMAP2+: timer: fix a kmemleak caused in omap_get_timer_dt (bsc#1051510).\n- arm: OMAP3: Fix prm wake interrupt for resume (bsc#1051510).\n- arm: OMAP3: hwmod_data: add missing module_offs for MMC3 (bsc#1051510).\n- arm: OMAP3+: PRM: fix of_irq_get() result check (bsc#1051510).\n- arm: OMAP4+: PRM: fix of_irq_get() result checks (bsc#1051510).\n- arm: OMAP: Fix dmtimer init for omap1 (bsc#1051510).\n- arm: OMAP: Fix SRAM W+X mapping (bsc#1051510).\n- arm: orion5x: Revert commit 4904dbda41c8 (bsc#1051510).\n- arm: orion: fix orion_ge00_switch_board_info initialization (bsc#1051510).\n- arm: pxa: select both FB and FB_W100 for eseries (bsc#1051510).\n- arm: pxa/tosa-bt: add MODULE_LICENSE tag (bsc#1051510).\n- arm: remove wrong CONFIG_PROC_SYSCTL ifdef (bsc#1051510).\n- arm: s3c24xx: Fix NAND ECC mode for mini2440 board (bsc#1051510).\n- arm: shmobile: defconfig: Enable missing PCIE_RCAR dependency (bsc#1051510).\n- arm: shmobile: defconfig: Replace DRM_RCAR_HDMI by generic bridge options (bsc#1051510).\n- arm: shmobile: defconfig: Replace SND_SOC_RSRC_CARD by SND_SIMPLE_SCU_CARD (bsc#1051510).\n- arm: shmobile: defconfig: Replace USB_XHCI_RCAR by USB_XHCI_PLATFORM (bsc#1051510).\n- arm: shmobile: rcar-gen2: Fix deadlock in regulator quirk (bsc#1051510).\n- arm: socfpga_defconfig: Remove QSPI Sector 4K size force (bsc#1051510).\n- arm: spear13xx: Fix dmas cells (bsc#1051510).\n- arm: sunxi_defconfig: Enable CMA (bsc#1051510).\n- arm: sunxi: fix the core number of V3s in sunxi README (bsc#1051510).\n- asoc: dpcm: fix BE dai not hw_free and shutdown (bsc#1051510).\n- asoc: topology: Add missing clock gating parameter when parsing hw_configs (bsc#1051510).\n- asoc: topology: Fix bclk and fsync inversion in set_link_hw_format() (bsc#1051510).\n- ata: do not schedule hot plug if it is a sas host ().\n- ath: Add regulatory mapping for APL13_WORLD (bsc#1051510).\n- ath: Add regulatory mapping for APL2_FCCA (bsc#1051510).\n- ath: Add regulatory mapping for Bahamas (bsc#1051510).\n- ath: Add regulatory mapping for Bermuda (bsc#1051510).\n- ath: Add regulatory mapping for ETSI8_WORLD (bsc#1051510).\n- ath: Add regulatory mapping for FCC3_ETSIC (bsc#1051510).\n- ath: Add regulatory mapping for Serbia (bsc#1051510).\n- ath: Add regulatory mapping for Tanzania (bsc#1051510).\n- ath: Add regulatory mapping for Uganda (bsc#1051510).\n- audit: fix potential null dereference \u0027context-\u003emodule.name\u0027 (bsc#1051510).\n- backlight: pwm_bl: Do not use GPIOF_* with gpiod_get_direction (bsc#1051510).\n- bdi: Move cgroup bdi_writeback to a dedicated low concurrency workqueue (bsc#1101867).\n- befs_lookup(): use d_splice_alias() (bsc#1101844).\n- block: Fix transfer when chunk sectors exceeds max (bsc#1101874).\n- bluetooth: btusb: Add a new Realtek 8723DE ID 2ff8:b011 (bsc#1051510).\n- bluetooth: btusb: add ID for LiteOn 04ca:301a (bsc#1051510).\n- bluetooth: hci_qca: Fix \u0027Sleep inside atomic section\u0027 warning (bsc#1051510).\n- branch-check: fix long-\u003eint truncation when profiling branches (bsc#1101116,).\n- brcmfmac: Add support for bcm43364 wireless chipset (bsc#1051510).\n- cachefiles: Fix missing clear of the CACHEFILES_OBJECT_ACTIVE flag (bsc#1099858).\n- cachefiles: Fix refcounting bug in backing-file read monitoring (bsc#1099858).\n- cachefiles: Wait rather than BUG\u0027ing on \u0027Unexpected object collision\u0027 (bsc#1099858).\n- can: dev: increase bus-off message severity (bsc#1051510).\n- can: ems_usb: Fix memory leak on ems_usb_disconnect() (bsc#1051510).\n- can: m_can: change comparison to bitshift when dealing with a mask (bsc#1051510).\n- cdrom: do not call check_disk_change() inside cdrom_open() (bsc#1101872).\n- clk: at91: fix clk-generated compilation (bsc#1051510).\n- clk: renesas: cpg-mssr: Stop using printk format %pCr (bsc#1051510).\n- coccinelle: fix parallel build with CHECK=scripts/coccicheck (bsc#1051510).\n- compiler.h: enable builtin overflow checkers and add fallback code (bsc#1101116,).\n- cpufreq: intel_pstate: Limit the scope of HWP dynamic boost platforms (bsc#1066110).\n- cpu/hotplug: Make bringup/teardown of smp threads symmetric (bsc#1089343).\n- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).\n- cpu/hotplug: Split do_cpu_down() (bsc#1089343).\n- crypto: authenc - do not leak pointers to authenc keys (bsc#1051510).\n- crypto: authencesn - do not leak pointers to authenc keys (bsc#1051510).\n- crypto: padlock-aes - Fix Nano workaround data corruption (bsc#1051510).\n- delayacct: fix crash in delayacct_blkio_end() after delayacct init failure (bsc#1104066).\n- dm: add writecache target (bsc#1101116,).\n- dm: prevent DAX mounts if not supported (bsc#1103917).\n- dm writecache: support optional offset for start of device (bsc#1101116,).\n- dm writecache: use 2-factor allocator arguments (bsc#1101116,).\n- doc: Add vendor prefix for Kieback \u0026 Peter GmbH (bsc#1051510).\n- drivers: soc: sunxi: fix error processing on base address when claiming (bsc#1051510).\n- drm: Add DP PSR2 sink enable bit (bsc#1051510).\n- drm/amdgpu: Remove VRAM from shared bo domains (bsc#1051510).\n- drm/atomic: Check old_plane_state-\u003ecrtc in drm_atomic_helper_async_check() (bsc#1051510).\n- drm/atomic: Handling the case when setting old crtc for plane (bsc#1051510).\n- drm/atomic-helper: Drop plane-\u003efb references only for drm_atomic_helper_shutdown() (bsc#1051510).\n- drm/atomic: Initialize variables in drm_atomic_helper_async_check() to make gcc happy (bsc#1051510).\n- drm/atomic: Make async plane update checks work as intended, v2 (bsc#1051510).\n- drm/atomic: Make atomic helper track newly assigned planes correctly, v2 (bsc#1051510).\n- drm/atomic: Make atomic iterators less surprising (bsc#1051510).\n- drm/dp/mst: Fix off-by-one typo when dump payload table (bsc#1051510).\n- drm/gma500: fix psb_intel_lvds_mode_valid()\u0027s return type (bsc#1051510).\n- drm/nouveau/fifo/gk104-: poll for runlist update completion (bsc#1051510).\n- drm/radeon: fix mode_valid\u0027s return type (bsc#1051510).\n- drm: re-enable error handling (bsc#1051510).\n- drm/vc4: Reset -\u003e{x, y}_scaling[1] when dealing with uniplanar formats (bsc#1051510).\n- Enable / support pinctrl-lewisburg ()\n- ext2: fix a block leak (bsc#1101875).\n- ext4: add more mount time checks of the superblock (bsc#1101900).\n- ext4: bubble errors from ext4_find_inline_data_nolock() up to ext4_iget() (bsc#1101896).\n- ext4: check superblock mapped prior to committing (bsc#1101902).\n- ext4: do not update s_last_mounted of a frozen fs (bsc#1101841).\n- ext4: factor out helper ext4_sample_last_mounted() (bsc#1101841).\n- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).\n- ext4: fix fencepost error in check for inode count overflow during resize (bsc#1101853).\n- ext4: include the illegal physical block in the bad map ext4_error msg (bsc#1101903).\n- ext4: report delalloc reserve as non-free in statfs for project quota (bsc#1101843).\n- ext4: update mtime in ext4_punch_hole even if no blocks are released (bsc#1101895).\n- f2fs: call unlock_new_inode() before d_instantiate() (bsc#1101837).\n- fix io_destroy()/aio_complete() race (bsc#1101852).\n- Force log to disk before reading the AGF during a fstrim (bsc#1101893).\n- fs: allow per-device dax status checking for filesystems (bsc#1103917).\n- fscache: Allow cancelled operations to be enqueued (bsc#1099858).\n- fscache: Fix hanging wait on page discarded by writeback (bsc#1101885).\n- fscache: Fix reference overput in fscache_attach_object() error handling (bsc#1099858).\n- fs: clear writeback errors in inode_init_always (bsc#1101882).\n- fs: do not scan the inode cache before SB_BORN is set (bsc#1101883).\n- genirq: Check __free_irq() return value for NULL (bsc#1103517).\n- hid: hid-plantronics: Re-resend Update to map button for PTT products (bsc#1051510).\n- hid: i2c-hid: check if device is there before really probing (bsc#1051510).\n- hippi: Fix a Fix a possible sleep-in-atomic bug in rr_close (bsc#1051510).\n- hv_netvsc: Ensure correct teardown message sequence order ().\n- hv/netvsc: fix handling of fallback to single queue mode ().\n- hv_netvsc: Fix net device attach on older Windows hosts ().\n- hv_netvsc: set master device (bsc#1051979).\n- hv_netvsc: Split netvsc_revoke_buf() and netvsc_teardown_gpadl() ().\n- hv_netvsc: split sub-channel setup into async and sync ().\n- hv_netvsc: Use Windows version instead of NVSP version on GPAD teardown ().\n- ibmasm: do not write out of bounds in read handler (bsc#1051510).\n- ibmvnic: Remove code to request error information (bsc#1104174).\n- ibmvnic: Revise RX/TX queue error messages (bsc#1101331).\n- ibmvnic: Update firmware error reporting with cause string (bsc#1104174).\n- input: elan_i2c - add ACPI ID for lenovo ideapad 330 (bsc#1051510).\n- input: elan_i2c - add another ACPI ID for Lenovo Ideapad 330-15AST (bsc#1051510).\n- input: i8042 - add Lenovo LaVie Z to the i8042 reset list (bsc#1051510).\n- irqchip: brcmstb-l2: Define an irq_pm_shutdown function (bsc#1051510).\n- irqchip/gic: Take lock when updating irq type (bsc#1051510).\n- irqchip/gic-v3: Change pr_debug message to pr_devel (bsc#1051510).\n- irqchip/gic-v3: Fix the driver probe() fail due to disabled GICC entry (bsc#1051510).\n- irqchip/gic-v3: Ignore disabled ITS nodes (bsc#1051510).\n- irqchip/gic-v3: Use wmb() instead of smb_wmb() in gic_raise_softirq() (bsc#1051510).\n- irqchip/qcom: Fix check for spurious interrupts (bsc#1051510).\n- irqchip/qcom: Fix u32 comparison with value less than zero (bsc#1051510).\n- isofs: fix potential memory leak in mount option parsing (bsc#1101887).\n- iwlwifi: add more card IDs for 9000 series (bsc#1051510).\n- iwlwifi: pcie: fix race in Rx buffer allocator (bsc#1051510).\n- jump_label: Fix concurrent static_key_enable/disable() (bsc#1089343).\n- jump_label: Provide hotplug context variants (bsc#1089343).\n- jump_label: Reorder hotplug lock and jump_label_lock (bsc#1089343).\n- kabi protect bdev_dax_supported (bsc#1103917).\n- kabi protect struct ccw_device_private (bsc#1103421).\n- kabi/severities: do not complain on hisi_sas internal changes ().\n- kabi/severities: ignore x86_kvm_ops; lttng-modules would have to be adjusted in case they depend on this particular change\n- kbuild: add \u0027-fno-stack-check\u0027 to kernel build options (bsc#1051510).\n- kbuild: Handle builtin dtb file names containing hyphens (bsc#1051510).\n- kbuild: pkg: use --transform option to prefix paths in tar (bsc#1051510).\n- kconfig: display recursive dependency resolution hint just once (bsc#1051510).\n- kmemleak: add scheduling point to kmemleak_scan() (bsc#1051510).\n- kvm: SVM: Add pause filter threshold ().\n- kvm: SVM: Implement pause loop exit logic in SVM ().\n- kvm: VMX: Bring the common code to header file ().\n- kvm: VMX: Fix the module parameters for vmx ().\n- kvm: VMX: Remove ple_window_actual_max ().\n- libata: add refcounting to ata_host (git-fixes).\n- libata: ensure host is free\u0027d on error exit paths (git-fixes).\n- libnvdimm, dimm: fix dpa reservation vs uninitialized label area (git-fixes).\n- linvdimm, pmem: Preserve read-only setting for pmem devices (git-fixes).\n- media: media-device: fix ioctl function types (bsc#1051510).\n- media: rcar_jpu: Add missing clk_disable_unprepare() on error in jpu_open() (bsc#1051510).\n- media: saa7164: Fix driver name in debug output (bsc#1051510).\n- media: si470x: fix __be16 annotations (bsc#1051510).\n- media: siano: get rid of __le32/__le16 cast warnings (bsc#1051510).\n- media: tw686x: Fix incorrect vb2_mem_ops GFP flags (bsc#1051510).\n- mfd: cros_ec: Fail early if we cannot identify the EC (bsc#1051510).\n- mfd: fsl-imx25: Clean up irq settings during removal (bsc#1051510).\n- mfd: mxs-lradc: Fix error handling in mxs_lradc_probe() (bsc#1051510).\n- misc: pci_endpoint_test: Avoid triggering a BUG() (bsc#1051510).\n- mmc: dw_mmc: update actual clock for mmc debugfs (bsc#1051510).\n- mmc: pwrseq: Use kmalloc_array instead of stack VLA (bsc#1051510).\n- mm: fix __gup_device_huge vs unmap (bsc#1101839).\n- mm/kmemleak.c: make cond_resched() rate-limiting more efficient (bsc#1051510).\n- mwifiex: correct histogram data with appropriate index (bsc#1051510).\n- mwifiex: handle race during mwifiex_usb_disconnect (bsc#1051510).\n- nohz: Fix local_timer_softirq_pending() (bsc#1051510).\n- nvme: ensure forward progress during Admin passthru (git-fixes).\n- nvme-fabrics: Ignore nr_io_queues option for discovery controllers (bsc#1102633).\n- nvme: fixup crash on failed discovery (bsc#1103920).\n- nvme.h: fixup ANA group descriptor format (bsc#1104111).\n- nvme: use hw qid in trace events (bsc#1102633).\n- orangefs: report attributes_mask and attributes for statx (bsc#1101832).\n- orangefs: set i_size on new symlink (bsc#1101845).\n- overflow.h: Add allocation size calculation helpers (bsc#1101116,).\n- pci: pciehp: Assume NoCompl+ for Thunderbolt ports (bsc#1051510).\n- pci: pciehp: Request control of native hotplug only if supported (bsc#1051510).\n- pci: Prevent sysfs disable of device while driver is attached (bsc#1051510).\n- pinctrl: at91-pio4: add missing of_node_put (bsc#1051510).\n- pinctrl: intel: Add Intel Lewisburg GPIO support ().\n- pinctrl: nand: meson-gxl: fix missing data pins (bsc#1051510).\n- pmem: only set QUEUE_FLAG_DAX for fsdax mode (bsc#1103917).\n- qed*: Add link change count value to ethtool statistics display (bsc#1086314).\n- qed: Add qed APIs for PHY module query (bsc#1086314 ).\n- qed: Add srq core support for RoCE and iWARP (bsc#1086314 ).\n- qede: Add driver callbacks for eeprom module query (bsc#1086314 ).\n- qed: fix spelling mistake \u0027successffuly\u0027 -\u003e \u0027successfully\u0027 (bsc#1086314).\n- qed: Make some functions static (bsc#1086314).\n- qed: remove redundant functions qed_get_cm_pq_idx_rl (bsc#1086314).\n- qed: remove redundant functions qed_set_gft_event_id_cm_hdr (bsc#1086314).\n- qed: remove redundant pointer \u0027name\u0027 (bsc#1086314).\n- qed: use dma_zalloc_coherent instead of allocator/memset (bsc#1086314).\n- qed*: Utilize FW 8.37.2.0 (bsc#1086314).\n- RDMA/qedr: Fix NULL pointer dereference when running over iWARP without RDMA-CM (bsc#1086314).\n- RDMA/qedr: fix spelling mistake: \u0027adrresses\u0027 -\u003e \u0027addresses\u0027 (bsc#1086314).\n- RDMA/qedr: fix spelling mistake: \u0027failes\u0027 -\u003e \u0027fails\u0027 (bsc#1086314).\n- regulator: pfuze100: add .is_enable() for pfuze100_swb_regulator_ops (bsc#1051510).\n- reiserfs: fix buffer overflow with long warning messages (bsc#1101847).\n- Revert \u0027drm/nouveau/drm/therm/fan: add a fallback if no fan control is specified in the vbios\u0027 (bsc#1103356).\n- s390/cio: clear timer when terminating driver I/O (bsc#1103421).\n- s390/cio: fix return code after missing interrupt (bsc#1103421).\n- s390/dasd: fix handling of internal requests (bsc#1103421).\n- s390/dasd: fix wrongly assigned configuration data (bsc#1103421).\n- s390/dasd: prevent prefix I/O error (bsc#1103421).\n- s390/eadm: fix CONFIG_BLOCK include dependency (bsc#1103421).\n- s390/ipl: ensure loadparm valid flag is set (bsc#1103421).\n- s390/pci: do not require AIS facility (bsc#1103421).\n- s390/qdio: do not release memory in qdio_setup_irq() (bsc#1103421).\n- sc16is7xx: Check for an error when the clock is enabled (bsc#1051510).\n- sched/fair: Consider RT/IRQ pressure in capacity_spare_wake() (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Fix find_idlest_group() when local group is not allowed (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Fix usage of find_idlest_group() when no groups are allowed (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Fix usage of find_idlest_group() when the local group is idlest (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Move select_task_rq_fair() slow-path into its own function (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Remove impossible condition from find_idlest_group_cpu() (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Remove unnecessary comparison with -1 (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Spare idle load balancing on nohz_full CPUs (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Use \u0027unsigned long\u0027 for utilization, consistently (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/smt: Update sched_smt_present at runtime (bsc#1089343).\n- scsi: ata: enhance the definition of SET MAX feature field value ().\n- scsi: hisi_sas: add an mechanism to do reset work synchronously ().\n- scsi: hisi_sas: add check of device in hisi_sas_task_exec() ().\n- scsi: hisi_sas: add internal abort dev in some places ().\n- scsi: hisi_sas: Add LED feature for v3 hw ().\n- scsi: hisi_sas: add RAS feature for v3 hw ().\n- scsi: hisi_sas: add readl poll timeout helper wrappers ().\n- scsi: hisi_sas: Add some checks to avoid free\u0027ing a sas_task twice ().\n- scsi: hisi_sas: add some print to enhance debugging ().\n- scsi: hisi_sas: Add v2 hw force PHY function for internal ATA command ().\n- scsi: hisi_sas: add v2 hw port AXI error handling support ().\n- scsi: hisi_sas: add v3 hw MODULE_DEVICE_TABLE() ().\n- scsi: hisi_sas: add v3 hw suspend and resume ().\n- scsi: hisi_sas: allocate slot buffer earlier ().\n- scsi: hisi_sas: Change common allocation mode of device id ().\n- scsi: hisi_sas: Change frame type for SET MAX commands ().\n- scsi: hisi_sas: change ncq process for v3 hw ().\n- scsi: hisi_sas: change slot index allocation mode ().\n- scsi: hisi_sas: check host frozen before calling \u0027done\u0027 function ().\n- scsi: hisi_sas: check IPTT is valid before using it for v3 hw ().\n- scsi: hisi_sas: check sas_dev gone earlier in hisi_sas_abort_task() ().\n- scsi: hisi_sas: Code cleanup and minor bug fixes ().\n- scsi: hisi_sas: config ATA de-reset as an constrained command for v3 hw ().\n- scsi: hisi_sas: consolidate command check in hisi_sas_get_ata_protocol() ().\n- scsi: hisi_sas: Create a scsi_host_template per HW module ().\n- scsi: hisi_sas: delete timer when removing hisi_sas driver ().\n- scsi: hisi_sas: do link reset for some CHL_INT2 ints ().\n- scsi: hisi_sas: Do not lock DQ for complete task sending ().\n- scsi: hisi_sas: dt-bindings: add an property of signal attenuation ().\n- scsi: hisi_sas: fix a bug in hisi_sas_dev_gone() ().\n- scsi: hisi_sas: fix a typo in hisi_sas_task_prep() ().\n- scsi: hisi_sas: fix dma_unmap_sg() parameter ().\n- scsi: hisi_sas: fix PI memory size ().\n- scsi: hisi_sas: fix return value of hisi_sas_task_prep() ().\n- scsi: hisi_sas: Fix return value when get_free_slot() failed ().\n- scsi: hisi_sas: fix SAS_QUEUE_FULL problem while running IO ().\n- scsi: hisi_sas: fix the issue of link rate inconsistency ().\n- scsi: hisi_sas: fix the issue of setting linkrate register ().\n- scsi: hisi_sas: improve int_chnl_int_v2_hw() consistency with v3 hw ().\n- scsi: hisi_sas: Include TMF elements in struct hisi_sas_slot ().\n- scsi: hisi_sas: increase timer expire of internal abort task ().\n- scsi: hisi_sas: Init disks after controller reset ().\n- scsi: hisi_sas: initialize dq spinlock before use ().\n- scsi: hisi_sas: Introduce hisi_sas_phy_set_linkrate() ().\n- scsi: hisi_sas: judge result of internal abort ().\n- scsi: hisi_sas: make local symbol host_attrs static ().\n- scsi: hisi_sas: make return type of prep functions void ().\n- scsi: hisi_sas: make SAS address of SATA disks unique ().\n- scsi: hisi_sas: Mark PHY as in reset for nexus reset ().\n- scsi: hisi_sas: modify hisi_sas_dev_gone() for reset ().\n- scsi: hisi_sas: modify some register config for hip08 ().\n- scsi: hisi_sas: optimise port id refresh function ().\n- scsi: hisi_sas: optimise the usage of DQ locking ().\n- scsi: hisi_sas: print device id for errors ().\n- scsi: hisi_sas: re-add the lldd_port_deformed() ().\n- scsi: hisi_sas: relocate clearing ITCT and freeing device ().\n- scsi: hisi_sas: relocate smp sg map ().\n- scsi: hisi_sas: Remove depends on HAS_DMA in case of platform dependency ().\n- scsi: hisi_sas: remove redundant handling to event95 for v3 ().\n- scsi: hisi_sas: remove some unneeded structure members ().\n- scsi: hisi_sas: remove unused variable hisi_sas_devices.running_req ().\n- scsi: hisi_sas: Reset disks when discovered ().\n- scsi: hisi_sas: some optimizations of host controller reset ().\n- scsi: hisi_sas: stop controller timer for reset ().\n- scsi: hisi_sas: support the property of signal attenuation for v2 hw ().\n- scsi: hisi_sas: Terminate STP reject quickly for v2 hw ().\n- scsi: hisi_sas: Try wait commands before before controller reset ().\n- scsi: hisi_sas: update PHY linkrate after a controller reset ().\n- scsi: hisi_sas: update RAS feature for later revision of v3 HW ().\n- scsi: hisi_sas: use an general way to delay PHY work ().\n- scsi: hisi_sas: Use device lock to protect slot alloc/free ().\n- scsi: hisi_sas: use dma_zalloc_coherent() ().\n- scsi: hisi_sas: workaround a v3 hw hilink bug ().\n- scsi: libsas: defer ata device eh commands to libata ().\n- scsi: lpfc: Add Buffer overflow check, when nvme_info larger than PAGE_SIZE (bsc#1102658).\n- scsi: lpfc: Correct LCB ACCept payload (bsc#1102658).\n- scsi: lpfc: devloss timeout race condition caused null pointer reference (bsc#1102658).\n- scsi: lpfc: Fix abort error path for NVMET (bsc#1102658).\n- scsi: lpfc: Fix driver crash when re-registering NVME rports (bsc#1102658).\n- scsi: lpfc: Fix driver not setting dpp bits correctly in doorbell word (bsc#1102658).\n- scsi: lpfc: Fix ELS abort on SLI-3 adapters (bsc#1102658).\n- scsi: lpfc: Fix list corruption on the completion queue (bsc#1102658).\n- scsi: lpfc: Fix NVME Target crash in defer rcv logic (bsc#1102658).\n- scsi: lpfc: Fix panic if driver unloaded when port is offline (bsc#1102658).\n- scsi: lpfc: Fix sysfs Speed value on CNA ports (bsc#1102658).\n- scsi: lpfc: Limit tracking of tgt queue depth in fast path (bsc#1102658).\n- scsi: lpfc: Make PBDE optimizations configurable (bsc#1102658).\n- scsi: lpfc: Remove lpfc_enable_pbde as module parameter (bsc#1102658).\n- scsi: lpfc: Revise copyright for new company language (bsc#1102658).\n- scsi: lpfc: Support duration field in Link Cable Beacon V1 command (bsc#1102658).\n- scsi: lpfc: update driver version to 12.0.0.5 (bsc#1102658).\n- scsi: lpfc: update driver version to 12.0.0.6 (bsc#1102658).\n- scsi: qla2xxx: Avoid double completion of abort command (git-fixes).\n- scsi: qla2xxx: Fix driver unload by shutting down chip (git-fixes).\n- scsi: qla2xxx: Fix NPIV deletion by calling wait_for_sess_deletion (git-fixes).\n- scsi: qla2xxx: Fix NULL pointer dereference for fcport search (git-fixes).\n- scsi: qla2xxx: Fix unintialized List head crash (git-fixes).\n- scsi: qla2xxx: Return error when TMF returns (git-fixes).\n- scsi: smartpqi: add in new supported controllers (bsc#1086274).\n- scsi: smartpqi: add inspur advantech ids (bsc#1086274).\n- scsi: smartpqi: bump driver version to 1.1.4-130 (bsc#1086274).\n- scsi: smartpqi: fix critical ARM issue reading PQI index registers (bsc#1086274).\n- scsi: smartpqi: improve error checking for sync requests (bsc#1086274).\n- scsi: smartpqi: improve handling for sync requests (bsc#1086274).\n- scsi: smartpqi: update driver version (bsc#1086274).\n- scsi: smartpqi: workaround fw bug for oq deletion (bsc#1086274).\n- sctp: fix the issue that pathmtu may be set lower than MINSEGMENT (git-fixes).\n- sctp: introduce sctp_dst_mtu (git-fixes).\n- soc: bcm2835: Make !RASPBERRYPI_FIRMWARE dummies return failure (bsc#1051510).\n- soc: bcm: raspberrypi-power: Fix use of __packed (bsc#1051510).\n- soc: imx: gpc: de-register power domains only if initialized (bsc#1051510).\n- soc: imx: gpc: restrict register range for regmap access (bsc#1051510).\n- soc: imx: gpcv2: correct PGC offset (bsc#1051510).\n- soc: imx: gpcv2: Do not pass static memory as platform data (bsc#1051510).\n- soc: imx: gpcv2: fix regulator deferred probe (bsc#1051510).\n- soc: mediatek: pwrap: fix compiler errors (bsc#1051510).\n- soc: qcom: wcnss_ctrl: Fix increment in NV upload (bsc#1051510).\n- soc: rockchip: power-domain: Fix wrong value when power up pd with writemask (bsc#1051510).\n- soc/tegra: Fix bad of_node_put() in powergate init (bsc#1051510).\n- soc/tegra: flowctrl: Fix error handling (bsc#1051510).\n- soc: ti: ti_sci_pm_domains: Populate name for genpd (bsc#1051510).\n- soc: zte: Restrict SOC_ZTE to ARCH_ZX or COMPILE_TEST (bsc#1051510).\n- spi: bcm2835aux: ensure interrupts are enabled for shared handler (bsc#1051510).\n- spi/bcm63xx-hspi: Enable the clock before calling clk_get_rate() (bsc#1051510).\n- spi: bcm-qspi: Always read and set BSPI_MAST_N_BOOT_CTRL (bsc#1051510).\n- spi: bcm-qspi: Avoid setting MSPI_CDRAM_PCS for spi-nor master (bsc#1051510).\n- spi: cadence: Add usleep_range() for cdns_spi_fill_tx_fifo() (bsc#1051510).\n- spi: pxa2xx: Allow 64-bit DMA (bsc#1051510).\n- spi: pxa2xx: check clk_prepare_enable() return value (bsc#1051510).\n- sr: pass down correctly sized SCSI sense buffer (git-fixes).\n- staging: ks7010: Use constants from ieee80211_eid instead of literal ints (bsc#1051510).\n- staging: speakup: fix wraparound in uaccess length check (bsc#1051510).\n- supported.conf: add drivers/md/dm-writecache\n- sysrq : fix Show Regs call trace on ARM (bsc#1051510).\n- thermal: exynos: fix setting rising_threshold for Exynos5433 (bsc#1051510).\n- tty: Fix data race in tty_insert_flip_string_fixed_flag (bsc#1051510).\n- typec: tcpm: Fix a msecs vs jiffies bug (bsc#1100132).\n- udf: Detect incorrect directory size (bsc#1101891).\n- udf: Provide saner default for invalid uid / gid (bsc#1101890).\n- Update config files to add CONFIG_DM_WRITECACHE=m\n- Update patches.arch/KVM-PPC-Check-if-IOMMU-page-is-contained-in-the-pinn.patch (bsc#1077761, git-fixes, bsc#1103948, bsc#1103949).\n- usb: hub: Do not wait for connect state at resume for powered-off ports (bsc#1051510).\n- usbip: usbip_detach: Fix memory, udev context and udev leak (bsc#1051510).\n- vfs: add the sb_start_intwrite_trylock() helper (bsc#1101841).\n- virtio_balloon: fix another race between migration and ballooning (bsc#1051510).\n- wlcore: sdio: check for valid platform device data before suspend (bsc#1051510).\n- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).\n- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).\n- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).\n- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).\n- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- x86/KVM/VMX: Add module argument for L1TF mitigation.\n- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).\n- x86/topology: Provide topology_smt_supported() (bsc#1089343).\n- x86: Treat R_X86_64_PLT32 as R_X86_64_PC32 (binutils_2.31).\n- xfs: catch inode allocation state mismatch corruption (bsc#1104211).\n- xfs: prevent creating negative-sized file via INSERT_RANGE (bsc#1101833).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Live-Patching-15-2018-1614", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2381-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2381-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182381-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2381-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004451.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1051979", "url": "https://bugzilla.suse.com/1051979" }, { "category": "self", "summary": "SUSE Bug 1066110", "url": "https://bugzilla.suse.com/1066110" }, { "category": "self", "summary": "SUSE Bug 1077761", "url": "https://bugzilla.suse.com/1077761" }, { "category": "self", "summary": "SUSE Bug 1086274", "url": "https://bugzilla.suse.com/1086274" }, { "category": "self", "summary": "SUSE Bug 1086314", "url": "https://bugzilla.suse.com/1086314" }, { "category": "self", "summary": "SUSE Bug 1087081", "url": "https://bugzilla.suse.com/1087081" }, { "category": "self", "summary": "SUSE Bug 1089343", "url": "https://bugzilla.suse.com/1089343" }, { "category": "self", "summary": "SUSE Bug 1099811", "url": "https://bugzilla.suse.com/1099811" }, { "category": "self", "summary": "SUSE Bug 1099813", "url": "https://bugzilla.suse.com/1099813" }, { "category": "self", "summary": "SUSE Bug 1099844", "url": "https://bugzilla.suse.com/1099844" }, { "category": "self", "summary": "SUSE Bug 1099845", "url": "https://bugzilla.suse.com/1099845" }, { "category": "self", "summary": "SUSE Bug 1099846", "url": "https://bugzilla.suse.com/1099846" }, { "category": "self", "summary": "SUSE Bug 1099849", "url": "https://bugzilla.suse.com/1099849" }, { "category": "self", "summary": "SUSE Bug 1099858", "url": "https://bugzilla.suse.com/1099858" }, { "category": "self", "summary": "SUSE Bug 1099863", "url": "https://bugzilla.suse.com/1099863" }, { "category": "self", "summary": "SUSE Bug 1099864", "url": "https://bugzilla.suse.com/1099864" }, { "category": "self", "summary": "SUSE Bug 1100132", "url": "https://bugzilla.suse.com/1100132" }, { "category": "self", "summary": "SUSE Bug 1101116", "url": "https://bugzilla.suse.com/1101116" }, { "category": "self", "summary": "SUSE Bug 1101331", "url": "https://bugzilla.suse.com/1101331" }, { "category": "self", "summary": "SUSE Bug 1101669", "url": "https://bugzilla.suse.com/1101669" }, { "category": "self", "summary": "SUSE Bug 1101828", "url": "https://bugzilla.suse.com/1101828" }, { "category": "self", "summary": "SUSE Bug 1101832", "url": "https://bugzilla.suse.com/1101832" }, { "category": "self", "summary": "SUSE Bug 1101833", "url": "https://bugzilla.suse.com/1101833" }, { "category": "self", "summary": "SUSE Bug 1101837", "url": "https://bugzilla.suse.com/1101837" }, { "category": "self", "summary": "SUSE Bug 1101839", "url": "https://bugzilla.suse.com/1101839" }, { "category": "self", "summary": "SUSE Bug 1101841", "url": "https://bugzilla.suse.com/1101841" }, { "category": "self", "summary": "SUSE Bug 1101843", "url": "https://bugzilla.suse.com/1101843" }, { "category": "self", "summary": "SUSE Bug 1101844", "url": "https://bugzilla.suse.com/1101844" }, { "category": "self", "summary": "SUSE Bug 1101845", "url": "https://bugzilla.suse.com/1101845" }, { "category": "self", "summary": "SUSE Bug 1101847", "url": "https://bugzilla.suse.com/1101847" }, { "category": "self", "summary": "SUSE Bug 1101852", "url": "https://bugzilla.suse.com/1101852" }, { "category": "self", "summary": "SUSE Bug 1101853", "url": "https://bugzilla.suse.com/1101853" }, { "category": "self", "summary": "SUSE Bug 1101867", "url": "https://bugzilla.suse.com/1101867" }, { "category": "self", "summary": "SUSE Bug 1101872", "url": "https://bugzilla.suse.com/1101872" }, { "category": "self", "summary": "SUSE Bug 1101874", "url": "https://bugzilla.suse.com/1101874" }, { "category": "self", "summary": "SUSE Bug 1101875", "url": "https://bugzilla.suse.com/1101875" }, { "category": "self", "summary": "SUSE Bug 1101882", "url": "https://bugzilla.suse.com/1101882" }, { "category": "self", "summary": "SUSE Bug 1101883", "url": "https://bugzilla.suse.com/1101883" }, { "category": "self", "summary": "SUSE Bug 1101885", "url": "https://bugzilla.suse.com/1101885" }, { "category": "self", "summary": "SUSE Bug 1101887", "url": "https://bugzilla.suse.com/1101887" }, { "category": "self", "summary": "SUSE Bug 1101890", "url": "https://bugzilla.suse.com/1101890" }, { "category": "self", "summary": "SUSE Bug 1101891", "url": "https://bugzilla.suse.com/1101891" }, { "category": "self", "summary": "SUSE Bug 1101893", "url": "https://bugzilla.suse.com/1101893" }, { "category": "self", "summary": "SUSE Bug 1101895", "url": "https://bugzilla.suse.com/1101895" }, { "category": "self", "summary": "SUSE Bug 1101896", "url": "https://bugzilla.suse.com/1101896" }, { "category": "self", "summary": "SUSE Bug 1101900", "url": "https://bugzilla.suse.com/1101900" }, { "category": "self", "summary": "SUSE Bug 1101902", "url": "https://bugzilla.suse.com/1101902" }, { "category": "self", "summary": "SUSE Bug 1101903", "url": "https://bugzilla.suse.com/1101903" }, { "category": "self", "summary": "SUSE Bug 1102633", "url": "https://bugzilla.suse.com/1102633" }, { "category": "self", "summary": "SUSE Bug 1102658", "url": "https://bugzilla.suse.com/1102658" }, { "category": "self", "summary": "SUSE Bug 1103097", "url": "https://bugzilla.suse.com/1103097" }, { "category": "self", "summary": "SUSE Bug 1103356", "url": "https://bugzilla.suse.com/1103356" }, { "category": "self", "summary": "SUSE Bug 1103421", "url": "https://bugzilla.suse.com/1103421" }, { "category": "self", "summary": "SUSE Bug 1103517", "url": "https://bugzilla.suse.com/1103517" }, { "category": "self", "summary": "SUSE Bug 1103723", "url": "https://bugzilla.suse.com/1103723" }, { "category": "self", "summary": "SUSE Bug 1103724", "url": "https://bugzilla.suse.com/1103724" }, { "category": "self", "summary": "SUSE Bug 1103725", "url": "https://bugzilla.suse.com/1103725" }, { "category": "self", "summary": "SUSE Bug 1103726", "url": "https://bugzilla.suse.com/1103726" }, { "category": "self", "summary": "SUSE Bug 1103727", "url": "https://bugzilla.suse.com/1103727" }, { "category": "self", "summary": "SUSE Bug 1103728", "url": "https://bugzilla.suse.com/1103728" }, { "category": "self", "summary": "SUSE Bug 1103729", "url": "https://bugzilla.suse.com/1103729" }, { "category": "self", "summary": "SUSE Bug 1103730", "url": "https://bugzilla.suse.com/1103730" }, { "category": "self", "summary": "SUSE Bug 1103917", "url": "https://bugzilla.suse.com/1103917" }, { "category": "self", "summary": "SUSE Bug 1103920", "url": "https://bugzilla.suse.com/1103920" }, { "category": "self", "summary": "SUSE Bug 1103948", "url": "https://bugzilla.suse.com/1103948" }, { "category": "self", "summary": "SUSE Bug 1103949", "url": "https://bugzilla.suse.com/1103949" }, { "category": "self", "summary": "SUSE Bug 1104066", "url": "https://bugzilla.suse.com/1104066" }, { "category": "self", "summary": "SUSE Bug 1104111", "url": "https://bugzilla.suse.com/1104111" }, { "category": "self", "summary": "SUSE Bug 1104174", "url": "https://bugzilla.suse.com/1104174" }, { "category": "self", "summary": "SUSE Bug 1104211", "url": "https://bugzilla.suse.com/1104211" }, { "category": "self", "summary": "SUSE Bug 1104319", "url": "https://bugzilla.suse.com/1104319" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10876 page", "url": "https://www.suse.com/security/cve/CVE-2018-10876/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10877 page", "url": "https://www.suse.com/security/cve/CVE-2018-10877/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10878 page", "url": "https://www.suse.com/security/cve/CVE-2018-10878/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10879 page", "url": "https://www.suse.com/security/cve/CVE-2018-10879/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10880 page", "url": "https://www.suse.com/security/cve/CVE-2018-10880/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10881 page", "url": "https://www.suse.com/security/cve/CVE-2018-10881/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10882 page", "url": "https://www.suse.com/security/cve/CVE-2018-10882/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10883 page", "url": "https://www.suse.com/security/cve/CVE-2018-10883/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3620 page", "url": "https://www.suse.com/security/cve/CVE-2018-3620/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5391 page", "url": "https://www.suse.com/security/cve/CVE-2018-5391/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-08-16T12:30:04Z", "generator": { "date": "2018-08-16T12:30:04Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2381-1", "initial_release_date": "2018-08-16T12:30:04Z", "revision_history": [ { "date": "2018-08-16T12:30:04Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "product": { "name": "kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "product_id": "kernel-default-livepatch-4.12.14-25.13.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-25.13.1.x86_64", "product": { "name": "kernel-default-livepatch-4.12.14-25.13.1.x86_64", "product_id": "kernel-default-livepatch-4.12.14-25.13.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-25.13.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le" }, "product_reference": "kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-25.13.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64" }, "product_reference": "kernel-default-livepatch-4.12.14-25.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10876", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10876" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10876", "url": "https://www.suse.com/security/cve/CVE-2018-10876" }, { "category": "external", "summary": "SUSE Bug 1099811 for CVE-2018-10876", "url": "https://bugzilla.suse.com/1099811" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T12:30:04Z", "details": "moderate" } ], "title": "CVE-2018-10876" }, { "cve": "CVE-2018-10877", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10877" } ], "notes": [ { "category": "general", "text": "Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10877", "url": "https://www.suse.com/security/cve/CVE-2018-10877" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10877", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099846 for CVE-2018-10877", "url": "https://bugzilla.suse.com/1099846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T12:30:04Z", "details": "moderate" } ], "title": "CVE-2018-10877" }, { "cve": "CVE-2018-10878", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10878" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10878", "url": "https://www.suse.com/security/cve/CVE-2018-10878" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10878", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099813 for CVE-2018-10878", "url": "https://bugzilla.suse.com/1099813" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T12:30:04Z", "details": "moderate" } ], "title": "CVE-2018-10878" }, { "cve": "CVE-2018-10879", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10879" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10879", "url": "https://www.suse.com/security/cve/CVE-2018-10879" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10879", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099844 for CVE-2018-10879", "url": "https://bugzilla.suse.com/1099844" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T12:30:04Z", "details": "moderate" } ], "title": "CVE-2018-10879" }, { "cve": "CVE-2018-10880", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10880" } ], "notes": [ { "category": "general", "text": "Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10880", "url": "https://www.suse.com/security/cve/CVE-2018-10880" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10880", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099845 for CVE-2018-10880", "url": "https://bugzilla.suse.com/1099845" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T12:30:04Z", "details": "moderate" } ], "title": "CVE-2018-10880" }, { "cve": "CVE-2018-10881", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10881" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10881", "url": "https://www.suse.com/security/cve/CVE-2018-10881" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10881", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099864 for CVE-2018-10881", "url": "https://bugzilla.suse.com/1099864" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T12:30:04Z", "details": "moderate" } ], "title": "CVE-2018-10881" }, { "cve": "CVE-2018-10882", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10882" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10882", "url": "https://www.suse.com/security/cve/CVE-2018-10882" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10882", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099849 for CVE-2018-10882", "url": "https://bugzilla.suse.com/1099849" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T12:30:04Z", "details": "moderate" } ], "title": "CVE-2018-10882" }, { "cve": "CVE-2018-10883", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10883" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10883", "url": "https://www.suse.com/security/cve/CVE-2018-10883" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10883", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099863 for CVE-2018-10883", "url": "https://bugzilla.suse.com/1099863" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T12:30:04Z", "details": "moderate" } ], "title": "CVE-2018-10883" }, { "cve": "CVE-2018-3620", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3620" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3620", "url": "https://www.suse.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1090340 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1090340" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T12:30:04Z", "details": "moderate" } ], "title": "CVE-2018-3620" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T12:30:04Z", "details": "important" } ], "title": "CVE-2018-3646" }, { "cve": "CVE-2018-5391", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5391" } ], "notes": [ { "category": "general", "text": "The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5391", "url": "https://www.suse.com/security/cve/CVE-2018-5391" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1108654 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1108654" }, { "category": "external", "summary": "SUSE Bug 1114071 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1114071" }, { "category": "external", "summary": "SUSE Bug 1121102 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1121102" }, { "category": "external", "summary": "SUSE Bug 1134140 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1134140" }, { "category": "external", "summary": "SUSE Bug 1181460 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1181460" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T12:30:04Z", "details": "moderate" } ], "title": "CVE-2018-5391" } ] }
suse-su-2018:2358-1
Vulnerability from csaf_suse
Published
2018-08-16 06:06
Modified
2018-08-16 06:06
Summary
Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP1)
Description of the patch
This update for the Linux Kernel 3.12.74-60_64_96 fixes several issues.
The following security issues were fixed:
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
Patchnames
SUSE-SLE-SAP-12-SP1-2018-1592,SUSE-SLE-SERVER-12-SP1-2018-1592
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_96 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).\n- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn\u0027t propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-1592,SUSE-SLE-SERVER-12-SP1-2018-1592", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2358-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2358-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182358-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2358-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004440.html" }, { "category": "self", "summary": "SUSE Bug 1097108", "url": "https://bugzilla.suse.com/1097108" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-08-16T06:06:18Z", "generator": { "date": "2018-08-16T06:06:18Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2358-1", "initial_release_date": "2018-08-16T06:06:18Z", "revision_history": [ { "date": "2018-08-16T06:06:18Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_96-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_96-default-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_96-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_96-xen-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_96-xen-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_96-xen-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:06:18Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:06:18Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2338-1
Vulnerability from csaf_suse
Published
2018-08-15 15:31
Modified
2018-08-15 15:31
Summary
Security update to ucode-intel
Notes
Title of the patch
Security update to ucode-intel
Description of the patch
ucode-intel was updated to the 20180807 release.
For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a) and is
part of the mitigations for CVE-2018-3639 (Spectre v4) and CVE-2018-3646
(L1 Terminal fault).
(bsc#1104134 bsc#1087082 bsc#1087083 bsc#1089343)
Processor Identifier Version Products
Model Stepping F-MO-S/PI Old->New
---- new platforms ----------------------------------------
WSM-EP/WS U1 6-2c-2/03 0000001f Xeon E/L/X56xx, W36xx
NHM-EX D0 6-2e-6/04 0000000d Xeon E/L/X65xx/75xx
BXT C0 6-5c-2/01 00000014 Atom T5500/5700
APL E0 6-5c-a/03 0000000c Atom x5-E39xx
DVN B0 6-5f-1/01 00000024 Atom C3xxx
---- updated platforms ------------------------------------
NHM-EP/WS D0 6-1a-5/03 00000019->0000001d Xeon E/L/X/W55xx
NHM B1 6-1e-5/13 00000007->0000000a Core i7-8xx, i5-7xx; Xeon L3426, X24xx
WSM B1 6-25-2/12 0000000e->00000011 Core i7-6xx, i5-6xx/4xxM, i3-5xx/3xxM, Pentium G69xx, Celeon P45xx; Xeon L3406
WSM K0 6-25-5/92 00000004->00000007 Core i7-6xx, i5-6xx/5xx/4xx, i3-5xx/3xx, Pentium G69xx/P6xxx/U5xxx, Celeron P4xxx/U3xxx
SNB D2 6-2a-7/12 0000002d->0000002e Core Gen2; Xeon E3
WSM-EX A2 6-2f-2/05 00000037->0000003b Xeon E7
IVB E2 6-3a-9/12 0000001f->00000020 Core Gen3 Mobile
HSW-H/S/E3 Cx/Dx 6-3c-3/32 00000024->00000025 Core Gen4 Desktop; Xeon E3 v3
BDW-U/Y E/F 6-3d-4/c0 0000002a->0000002b Core Gen5 Mobile
HSW-ULT Cx/Dx 6-45-1/72 00000023->00000024 Core Gen4 Mobile and derived Pentium/Celeron
HSW-H Cx 6-46-1/32 00000019->0000001a Core Extreme i7-5xxxX
BDW-H/E3 E/G 6-47-1/22 0000001d->0000001e Core i5-5xxxR/C, i7-5xxxHQ/EQ; Xeon E3 v4
SKL-U/Y D0 6-4e-3/c0 000000c2->000000c6 Core Gen6 Mobile
BDX-DE V1 6-56-2/10 00000015->00000017 Xeon D-1520/40
BDX-DE V2/3 6-56-3/10 07000012->07000013 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
BDX-DE Y0 6-56-4/10 0f000011->0f000012 Xeon D-1557/59/67/71/77/81/87
APL D0 6-5c-9/03 0000002c->00000032 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
SKL-H/S/E3 R0 6-5e-3/36 000000c2->000000c6 Core Gen6; Xeon E3 v5
Patchnames
SUSE-SLE-Module-Basesystem-15-2018-1580
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update to ucode-intel", "title": "Title of the patch" }, { "category": "description", "text": "\nucode-intel was updated to the 20180807 release.\n\nFor the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a) and is\npart of the mitigations for CVE-2018-3639 (Spectre v4) and CVE-2018-3646\n(L1 Terminal fault).\n(bsc#1104134 bsc#1087082 bsc#1087083 bsc#1089343)\n\n Processor Identifier Version Products\n\n Model Stepping F-MO-S/PI Old-\u003eNew\n\n ---- new platforms ----------------------------------------\n WSM-EP/WS U1 6-2c-2/03 0000001f Xeon E/L/X56xx, W36xx\n NHM-EX D0 6-2e-6/04 0000000d Xeon E/L/X65xx/75xx\n BXT C0 6-5c-2/01 00000014 Atom T5500/5700\n APL E0 6-5c-a/03 0000000c Atom x5-E39xx\n DVN B0 6-5f-1/01 00000024 Atom C3xxx\n ---- updated platforms ------------------------------------\n NHM-EP/WS D0 6-1a-5/03 00000019-\u003e0000001d Xeon E/L/X/W55xx\n NHM B1 6-1e-5/13 00000007-\u003e0000000a Core i7-8xx, i5-7xx; Xeon L3426, X24xx\n WSM B1 6-25-2/12 0000000e-\u003e00000011 Core i7-6xx, i5-6xx/4xxM, i3-5xx/3xxM, Pentium G69xx, Celeon P45xx; Xeon L3406\n WSM K0 6-25-5/92 00000004-\u003e00000007 Core i7-6xx, i5-6xx/5xx/4xx, i3-5xx/3xx, Pentium G69xx/P6xxx/U5xxx, Celeron P4xxx/U3xxx\n SNB D2 6-2a-7/12 0000002d-\u003e0000002e Core Gen2; Xeon E3\n WSM-EX A2 6-2f-2/05 00000037-\u003e0000003b Xeon E7\n IVB E2 6-3a-9/12 0000001f-\u003e00000020 Core Gen3 Mobile\n HSW-H/S/E3 Cx/Dx 6-3c-3/32 00000024-\u003e00000025 Core Gen4 Desktop; Xeon E3 v3\n BDW-U/Y E/F 6-3d-4/c0 0000002a-\u003e0000002b Core Gen5 Mobile\n HSW-ULT Cx/Dx 6-45-1/72 00000023-\u003e00000024 Core Gen4 Mobile and derived Pentium/Celeron\n HSW-H Cx 6-46-1/32 00000019-\u003e0000001a Core Extreme i7-5xxxX\n BDW-H/E3 E/G 6-47-1/22 0000001d-\u003e0000001e Core i5-5xxxR/C, i7-5xxxHQ/EQ; Xeon E3 v4\n SKL-U/Y D0 6-4e-3/c0 000000c2-\u003e000000c6 Core Gen6 Mobile\n BDX-DE V1 6-56-2/10 00000015-\u003e00000017 Xeon D-1520/40\n BDX-DE V2/3 6-56-3/10 07000012-\u003e07000013 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19\n BDX-DE Y0 6-56-4/10 0f000011-\u003e0f000012 Xeon D-1557/59/67/71/77/81/87\n APL D0 6-5c-9/03 0000002c-\u003e00000032 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx\n SKL-H/S/E3 R0 6-5e-3/36 000000c2-\u003e000000c6 Core Gen6; Xeon E3 v5\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Basesystem-15-2018-1580", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2338-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2338-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182338-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2338-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004422.html" }, { "category": "self", "summary": "SUSE Bug 1087082", "url": "https://bugzilla.suse.com/1087082" }, { "category": "self", "summary": "SUSE Bug 1087083", "url": "https://bugzilla.suse.com/1087083" }, { "category": "self", "summary": "SUSE Bug 1089343", "url": "https://bugzilla.suse.com/1089343" }, { "category": "self", "summary": "SUSE Bug 1104134", "url": "https://bugzilla.suse.com/1104134" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3639 page", "url": "https://www.suse.com/security/cve/CVE-2018-3639/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3640 page", "url": "https://www.suse.com/security/cve/CVE-2018-3640/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update to ucode-intel", "tracking": { "current_release_date": "2018-08-15T15:31:46Z", "generator": { "date": "2018-08-15T15:31:46Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2338-1", "initial_release_date": "2018-08-15T15:31:46Z", "revision_history": [ { "date": "2018-08-15T15:31:46Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ucode-intel-20180807-3.6.1.x86_64", "product": { "name": "ucode-intel-20180807-3.6.1.x86_64", "product_id": "ucode-intel-20180807-3.6.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20180807-3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:ucode-intel-20180807-3.6.1.x86_64" }, "product_reference": "ucode-intel-20180807-3.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-3639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3639" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:ucode-intel-20180807-3.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3639", "url": "https://www.suse.com/security/cve/CVE-2018-3639" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1085235 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085235" }, { "category": "external", "summary": "SUSE Bug 1085308 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085308" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092631 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092631" }, { "category": "external", "summary": "SUSE Bug 1092885 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092885" }, { "category": "external", "summary": "SUSE Bug 1094912 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1094912" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100394 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1100394" }, { "category": "external", "summary": "SUSE Bug 1102640 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1102640" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1105412" }, { "category": "external", "summary": "SUSE Bug 1111963 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1111963" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172781" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172782" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172783" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:ucode-intel-20180807-3.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:ucode-intel-20180807-3.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T15:31:46Z", "details": "moderate" } ], "title": "CVE-2018-3639" }, { "cve": "CVE-2018-3640", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3640" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:ucode-intel-20180807-3.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3640", "url": "https://www.suse.com/security/cve/CVE-2018-3640" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087083 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1087083" }, { "category": "external", "summary": "SUSE Bug 1094912 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1094912" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100394 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1100394" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1175912 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1175912" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:ucode-intel-20180807-3.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:ucode-intel-20180807-3.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T15:31:46Z", "details": "moderate" } ], "title": "CVE-2018-3640" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:ucode-intel-20180807-3.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:ucode-intel-20180807-3.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:ucode-intel-20180807-3.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T15:31:46Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2353-1
Vulnerability from csaf_suse
Published
2018-08-16 06:06
Modified
2018-08-16 06:06
Summary
Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP1)
Description of the patch
This update for the Linux Kernel 3.12.74-60_64_63 fixes several issues.
The following security issues were fixed:
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2017-11600: net/xfrm/xfrm_policy.c did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bsc#1096564)
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
Patchnames
SUSE-SLE-SAP-12-SP1-2018-1599,SUSE-SLE-SERVER-12-SP1-2018-1599
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_63 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).\n- CVE-2017-11600: net/xfrm/xfrm_policy.c did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bsc#1096564) \n- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn\u0027t propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-1599,SUSE-SLE-SERVER-12-SP1-2018-1599", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2353-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2353-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182353-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2353-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004436.html" }, { "category": "self", "summary": "SUSE Bug 1096564", "url": "https://bugzilla.suse.com/1096564" }, { "category": "self", "summary": "SUSE Bug 1097108", "url": "https://bugzilla.suse.com/1097108" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE CVE CVE-2017-11600 page", "url": "https://www.suse.com/security/cve/CVE-2017-11600/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-08-16T06:06:54Z", "generator": { "date": "2018-08-16T06:06:54Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2353-1", "initial_release_date": "2018-08-16T06:06:54Z", "revision_history": [ { "date": "2018-08-16T06:06:54Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_63-default-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_63-default-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_63-default-8-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_63-xen-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_63-xen-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_63-xen-8-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-11600", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-11600" } ], "notes": [ { "category": "general", "text": "net/xfrm/xfrm_policy.c in the Linux kernel through 4.12.3, when CONFIG_XFRM_MIGRATE is enabled, does not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allows local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-11600", "url": "https://www.suse.com/security/cve/CVE-2017-11600" }, { "category": "external", "summary": "SUSE Bug 1050231 for CVE-2017-11600", "url": "https://bugzilla.suse.com/1050231" }, { "category": "external", "summary": "SUSE Bug 1096564 for CVE-2017-11600", "url": "https://bugzilla.suse.com/1096564" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-11600", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:06:54Z", "details": "important" } ], "title": "CVE-2017-11600" }, { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:06:54Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:06:54Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2401-1
Vulnerability from csaf_suse
Published
2018-08-17 06:54
Modified
2018-08-17 06:54
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following security issues:
- CVE-2018-3646: Systems with microprocessors utilizing speculative execution
and address translations may have allowed unauthorized disclosure of
information residing in the L1 data cache to an attacker with local user access
with guest OS privilege via a terminal page fault and a side-channel analysis
(bsc#1091107, bsc#1027519).
- Incorrect MSR_DEBUGCTL handling let guests enable BTS allowing a malicious or
buggy guest administrator can lock up the entire host (bsc#1103276)
Patchnames
SUSE-SLE-DESKTOP-12-SP3-2018-1656,SUSE-SLE-SDK-12-SP3-2018-1656,SUSE-SLE-SERVER-12-SP3-2018-1656
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following security issues:\n\n- CVE-2018-3646: Systems with microprocessors utilizing speculative execution\n and address translations may have allowed unauthorized disclosure of\n information residing in the L1 data cache to an attacker with local user access\n with guest OS privilege via a terminal page fault and a side-channel analysis\n (bsc#1091107, bsc#1027519).\n- Incorrect MSR_DEBUGCTL handling let guests enable BTS allowing a malicious or\n buggy guest administrator can lock up the entire host (bsc#1103276)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP3-2018-1656,SUSE-SLE-SDK-12-SP3-2018-1656,SUSE-SLE-SERVER-12-SP3-2018-1656", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2401-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2401-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182401-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2401-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004461.html" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1091107", "url": "https://bugzilla.suse.com/1091107" }, { "category": "self", "summary": "SUSE Bug 1103276", "url": "https://bugzilla.suse.com/1103276" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2018-08-17T06:54:52Z", "generator": { "date": "2018-08-17T06:54:52Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2401-1", "initial_release_date": "2018-08-17T06:54:52Z", "revision_history": [ { "date": "2018-08-17T06:54:52Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-devel-4.9.2_10-3.41.1.aarch64", "product": { "name": "xen-devel-4.9.2_10-3.41.1.aarch64", "product_id": "xen-devel-4.9.2_10-3.41.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-4.9.2_10-3.41.1.x86_64", "product": { "name": "xen-4.9.2_10-3.41.1.x86_64", "product_id": "xen-4.9.2_10-3.41.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.9.2_10-3.41.1.x86_64", "product": { "name": "xen-libs-4.9.2_10-3.41.1.x86_64", "product_id": "xen-libs-4.9.2_10-3.41.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.9.2_10-3.41.1.x86_64", "product": { "name": "xen-libs-32bit-4.9.2_10-3.41.1.x86_64", "product_id": "xen-libs-32bit-4.9.2_10-3.41.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.9.2_10-3.41.1.x86_64", "product": { "name": "xen-devel-4.9.2_10-3.41.1.x86_64", "product_id": "xen-devel-4.9.2_10-3.41.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.9.2_10-3.41.1.x86_64", "product": { "name": "xen-doc-html-4.9.2_10-3.41.1.x86_64", "product_id": "xen-doc-html-4.9.2_10-3.41.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.9.2_10-3.41.1.x86_64", "product": { "name": "xen-tools-4.9.2_10-3.41.1.x86_64", "product_id": "xen-tools-4.9.2_10-3.41.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.9.2_10-3.41.1.x86_64", "product": { "name": "xen-tools-domU-4.9.2_10-3.41.1.x86_64", "product_id": "xen-tools-domU-4.9.2_10-3.41.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3", "product": { "name": "SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.9.2_10-3.41.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.2_10-3.41.1.x86_64" }, "product_reference": "xen-4.9.2_10-3.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.9.2_10-3.41.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.2_10-3.41.1.x86_64" }, "product_reference": "xen-libs-4.9.2_10-3.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.9.2_10-3.41.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.2_10-3.41.1.x86_64" }, "product_reference": "xen-libs-32bit-4.9.2_10-3.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.9.2_10-3.41.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_10-3.41.1.aarch64" }, "product_reference": "xen-devel-4.9.2_10-3.41.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.9.2_10-3.41.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_10-3.41.1.x86_64" }, "product_reference": "xen-devel-4.9.2_10-3.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.9.2_10-3.41.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:xen-4.9.2_10-3.41.1.x86_64" }, "product_reference": "xen-4.9.2_10-3.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.9.2_10-3.41.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.2_10-3.41.1.x86_64" }, "product_reference": "xen-doc-html-4.9.2_10-3.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.9.2_10-3.41.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.2_10-3.41.1.x86_64" }, "product_reference": "xen-libs-4.9.2_10-3.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.9.2_10-3.41.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.2_10-3.41.1.x86_64" }, "product_reference": "xen-libs-32bit-4.9.2_10-3.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.9.2_10-3.41.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.2_10-3.41.1.x86_64" }, "product_reference": "xen-tools-4.9.2_10-3.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.9.2_10-3.41.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.2_10-3.41.1.x86_64" }, "product_reference": "xen-tools-domU-4.9.2_10-3.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.9.2_10-3.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.2_10-3.41.1.x86_64" }, "product_reference": "xen-4.9.2_10-3.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.9.2_10-3.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.2_10-3.41.1.x86_64" }, "product_reference": "xen-doc-html-4.9.2_10-3.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.9.2_10-3.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.2_10-3.41.1.x86_64" }, "product_reference": "xen-libs-4.9.2_10-3.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.9.2_10-3.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.2_10-3.41.1.x86_64" }, "product_reference": "xen-libs-32bit-4.9.2_10-3.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.9.2_10-3.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.2_10-3.41.1.x86_64" }, "product_reference": "xen-tools-4.9.2_10-3.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.9.2_10-3.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.2_10-3.41.1.x86_64" }, "product_reference": "xen-tools-domU-4.9.2_10-3.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_10-3.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_10-3.41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_10-3.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_10-3.41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.2_10-3.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_10-3.41.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_10-3.41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-17T06:54:52Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2344-1
Vulnerability from csaf_suse
Published
2018-08-16 07:06
Modified
2018-08-16 07:06
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).
- CVE-2018-5390 aka 'SegmentSmack': The Linux Kernel can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bnc#1102340).
- CVE-2018-5391 aka 'FragmentSmack': A flaw in the IP packet reassembly could be used by remote attackers to consume lots of CPU time (bnc#1103097).
- CVE-2018-14734: drivers/infiniband/core/ucma.c allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).
- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn't properly validate the sigevent->sigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bnc#1102851 bnc#1103580).
- CVE-2018-9385: When printing the 'driver_override' option from with-in the amba driver, a very long line could expose one additional uninitialized byte (bnc#1100491).
- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).
- CVE-2018-13405: The inode_init_owner function in fs/inode.c allowed local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID (bnc#1100416).
- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 1100418).
- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations could be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).
The following non-security bugs were fixed:
- Add support for 5,25,50, and 100G to 802.3ad bonding driver (bsc#1096978)
- bcache: add backing_request_endio() for bi_end_io (bsc#1064232).
- bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1064232).
- bcache: add io_disable to struct cached_dev (bsc#1064232).
- bcache: add journal statistic (bsc#1076110).
- bcache: Add __printf annotation to __bch_check_keys() (bsc#1064232).
- bcache: add stop_when_cache_set_failed option to backing device (bsc#1064232).
- bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1064232).
- bcache: Annotate switch fall-through (bsc#1064232).
- bcache: closures: move control bits one bit right (bsc#1076110).
- bcache: correct flash only vols (check all uuids) (bsc#1064232).
- bcache: count backing device I/O error for writeback I/O (bsc#1064232).
- bcache: do not attach backing with duplicate UUID (bsc#1076110).
- bcache: Fix a compiler warning in bcache_device_init() (bsc#1064232).
- bcache: fix cached_dev->count usage for bch_cache_set_error() (bsc#1064232).
- bcache: fix crashes in duplicate cache device register (bsc#1076110).
- bcache: fix error return value in memory shrink (bsc#1064232).
- bcache: fix for allocator and register thread race (bsc#1076110).
- bcache: fix for data collapse after re-attaching an attached device (bsc#1076110).
- bcache: fix high CPU occupancy during journal (bsc#1076110).
- bcache: Fix, improve efficiency of closure_sync() (bsc#1076110).
- bcache: fix inaccurate io state for detached bcache devices (bsc#1064232).
- bcache: fix incorrect sysfs output value of strip size (bsc#1064232).
- bcache: Fix indentation (bsc#1064232).
- bcache: fix kcrashes with fio in RAID5 backend dev (bsc#1076110).
- bcache: Fix kernel-doc warnings (bsc#1064232).
- bcache: fix misleading error message in bch_count_io_errors() (bsc#1064232).
- bcache: fix using of loop variable in memory shrink (bsc#1064232).
- bcache: fix writeback target calc on large devices (bsc#1076110).
- bcache: fix wrong return value in bch_debug_init() (bsc#1076110).
- bcache: mark closure_sync() __sched (bsc#1076110).
- bcache: move closure debug file into debug directory (bsc#1064232).
- bcache: properly set task state in bch_writeback_thread() (bsc#1064232).
- bcache: quit dc->writeback_thread when BCACHE_DEV_DETACHING is set (bsc#1064232).
- bcache: reduce cache_set devices iteration by devices_max_used (bsc#1064232).
- bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1064232).
- bcache: Remove an unused variable (bsc#1064232).
- bcache: ret IOERR when read meets metadata error (bsc#1076110).
- bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1064232).
- bcache: return attach error when no cache set exist (bsc#1076110).
- bcache: segregate flash only volume write streams (bsc#1076110).
- bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1064232).
- bcache: set dc->io_disable to true in conditional_stop_bcache_device() (bsc#1064232).
- bcache: set error_limit correctly (bsc#1064232).
- bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1064232).
- bcache: stop bcache device when backing device is offline (bsc#1064232).
- bcache: stop dc->writeback_rate_update properly (bsc#1064232).
- bcache: stop writeback thread after detaching (bsc#1076110).
- bcache: store disk name in struct cache and struct cached_dev (bsc#1064232).
- bcache: Suppress more warnings about set-but-not-used variables (bsc#1064232).
- bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1064232).
- bcache: Use PTR_ERR_OR_ZERO() (bsc#1076110).
- bpf: properly enforce index mask to prevent out-of-bounds speculation (bsc#1098425).
- cifs: Check for timeout on Negotiate stage (bsc#1091171).
- cifs: fix bad/NULL ptr dereferencing in SMB2_sess_setup() (bsc#1090123).
- cpu/hotplug: Add sysfs state interface (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- ext4: fix unsupported feature message formatting (bsc#1098435).
- Hang/soft lockup in d_invalidate with simultaneous calls (bsc#1094248, bsc@1097140).
- ixgbe: fix possible race in reset subtask (bsc#1101557).
- ixgbe: Refactor queue disable logic to take completion time into account (bsc#1101557).
- ixgbe: Reorder Tx/Rx shutdown to reduce time needed to stop device (bsc#1101557).
- ixgbe: use atomic bitwise operations when handling reset requests (bsc#1101557).
- kabi/severities: add PASS to drivers/md/bcache/*, no one uses bcache kernel module.
- procfs: add tunable for fd/fdinfo dentry retention (bsc#1086652).
- sched/sysctl: Check user input value of sysctl_sched_time_avg (bsc#1100089).
- signals: avoid unnecessary taking of sighand->siglock (bsc#1096130).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343). Update config files.
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/mm: Simplify p[g4um]d_page() macros (1087081).
- x86/pti: do not report XenPV as vulnerable (bsc#1097551).
- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/topology: Add topology_max_smt_threads() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- xen/grant-table: log the lack of grants (bnc#1085042).
Patchnames
SUSE-OpenStack-Cloud-7-2018-1603,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-1603,SUSE-SLE-HA-12-SP2-2018-1603,SUSE-SLE-SAP-12-SP2-2018-1603,SUSE-SLE-SERVER-12-SP2-2018-1603,SUSE-Storage-4-2018-1603
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).\n- CVE-2018-5390 aka \u0027SegmentSmack\u0027: The Linux Kernel can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bnc#1102340).\n- CVE-2018-5391 aka \u0027FragmentSmack\u0027: A flaw in the IP packet reassembly could be used by remote attackers to consume lots of CPU time (bnc#1103097).\n- CVE-2018-14734: drivers/infiniband/core/ucma.c allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).\n- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bnc#1102851 bnc#1103580).\n- CVE-2018-9385: When printing the \u0027driver_override\u0027 option from with-in the amba driver, a very long line could expose one additional uninitialized byte (bnc#1100491).\n- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).\n- CVE-2018-13405: The inode_init_owner function in fs/inode.c allowed local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID (bnc#1100416).\n- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 1100418).\n- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations could be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).\n\nThe following non-security bugs were fixed:\n\n- Add support for 5,25,50, and 100G to 802.3ad bonding driver (bsc#1096978)\n- bcache: add backing_request_endio() for bi_end_io (bsc#1064232).\n- bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1064232).\n- bcache: add io_disable to struct cached_dev (bsc#1064232).\n- bcache: add journal statistic (bsc#1076110).\n- bcache: Add __printf annotation to __bch_check_keys() (bsc#1064232).\n- bcache: add stop_when_cache_set_failed option to backing device (bsc#1064232).\n- bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1064232).\n- bcache: Annotate switch fall-through (bsc#1064232).\n- bcache: closures: move control bits one bit right (bsc#1076110).\n- bcache: correct flash only vols (check all uuids) (bsc#1064232).\n- bcache: count backing device I/O error for writeback I/O (bsc#1064232).\n- bcache: do not attach backing with duplicate UUID (bsc#1076110).\n- bcache: Fix a compiler warning in bcache_device_init() (bsc#1064232).\n- bcache: fix cached_dev-\u003ecount usage for bch_cache_set_error() (bsc#1064232).\n- bcache: fix crashes in duplicate cache device register (bsc#1076110).\n- bcache: fix error return value in memory shrink (bsc#1064232).\n- bcache: fix for allocator and register thread race (bsc#1076110).\n- bcache: fix for data collapse after re-attaching an attached device (bsc#1076110).\n- bcache: fix high CPU occupancy during journal (bsc#1076110).\n- bcache: Fix, improve efficiency of closure_sync() (bsc#1076110).\n- bcache: fix inaccurate io state for detached bcache devices (bsc#1064232).\n- bcache: fix incorrect sysfs output value of strip size (bsc#1064232).\n- bcache: Fix indentation (bsc#1064232).\n- bcache: fix kcrashes with fio in RAID5 backend dev (bsc#1076110).\n- bcache: Fix kernel-doc warnings (bsc#1064232).\n- bcache: fix misleading error message in bch_count_io_errors() (bsc#1064232).\n- bcache: fix using of loop variable in memory shrink (bsc#1064232).\n- bcache: fix writeback target calc on large devices (bsc#1076110).\n- bcache: fix wrong return value in bch_debug_init() (bsc#1076110).\n- bcache: mark closure_sync() __sched (bsc#1076110).\n- bcache: move closure debug file into debug directory (bsc#1064232).\n- bcache: properly set task state in bch_writeback_thread() (bsc#1064232).\n- bcache: quit dc-\u003ewriteback_thread when BCACHE_DEV_DETACHING is set (bsc#1064232).\n- bcache: reduce cache_set devices iteration by devices_max_used (bsc#1064232).\n- bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1064232).\n- bcache: Remove an unused variable (bsc#1064232).\n- bcache: ret IOERR when read meets metadata error (bsc#1076110).\n- bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1064232).\n- bcache: return attach error when no cache set exist (bsc#1076110).\n- bcache: segregate flash only volume write streams (bsc#1076110).\n- bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1064232).\n- bcache: set dc-\u003eio_disable to true in conditional_stop_bcache_device() (bsc#1064232).\n- bcache: set error_limit correctly (bsc#1064232).\n- bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1064232).\n- bcache: stop bcache device when backing device is offline (bsc#1064232).\n- bcache: stop dc-\u003ewriteback_rate_update properly (bsc#1064232).\n- bcache: stop writeback thread after detaching (bsc#1076110).\n- bcache: store disk name in struct cache and struct cached_dev (bsc#1064232).\n- bcache: Suppress more warnings about set-but-not-used variables (bsc#1064232).\n- bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1064232).\n- bcache: Use PTR_ERR_OR_ZERO() (bsc#1076110).\n- bpf: properly enforce index mask to prevent out-of-bounds speculation (bsc#1098425).\n- cifs: Check for timeout on Negotiate stage (bsc#1091171).\n- cifs: fix bad/NULL ptr dereferencing in SMB2_sess_setup() (bsc#1090123).\n- cpu/hotplug: Add sysfs state interface (bsc#1089343).\n- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).\n- cpu/hotplug: Split do_cpu_down() (bsc#1089343).\n- ext4: fix unsupported feature message formatting (bsc#1098435).\n- Hang/soft lockup in d_invalidate with simultaneous calls (bsc#1094248, bsc@1097140).\n- ixgbe: fix possible race in reset subtask (bsc#1101557).\n- ixgbe: Refactor queue disable logic to take completion time into account (bsc#1101557).\n- ixgbe: Reorder Tx/Rx shutdown to reduce time needed to stop device (bsc#1101557).\n- ixgbe: use atomic bitwise operations when handling reset requests (bsc#1101557).\n- kabi/severities: add PASS to drivers/md/bcache/*, no one uses bcache kernel module.\n- procfs: add tunable for fd/fdinfo dentry retention (bsc#1086652).\n- sched/sysctl: Check user input value of sysctl_sched_time_avg (bsc#1100089).\n- signals: avoid unnecessary taking of sighand-\u003esiglock (bsc#1096130).\n- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).\n- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343). Update config files.\n- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).\n- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- x86/mm: Simplify p[g4um]d_page() macros (1087081).\n- x86/pti: do not report XenPV as vulnerable (bsc#1097551).\n- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).\n- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).\n- x86/topology: Add topology_max_smt_threads() (bsc#1089343).\n- x86/topology: Provide topology_smt_supported() (bsc#1089343).\n- xen/grant-table: log the lack of grants (bnc#1085042).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-OpenStack-Cloud-7-2018-1603,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-1603,SUSE-SLE-HA-12-SP2-2018-1603,SUSE-SLE-SAP-12-SP2-2018-1603,SUSE-SLE-SERVER-12-SP2-2018-1603,SUSE-Storage-4-2018-1603", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2344-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2344-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182344-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2344-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" }, { "category": "self", "summary": "SUSE Bug 1064232", "url": "https://bugzilla.suse.com/1064232" }, { "category": "self", "summary": "SUSE Bug 1076110", "url": "https://bugzilla.suse.com/1076110" }, { "category": "self", "summary": "SUSE Bug 1083635", "url": "https://bugzilla.suse.com/1083635" }, { "category": "self", "summary": "SUSE Bug 1085042", "url": "https://bugzilla.suse.com/1085042" }, { "category": "self", "summary": "SUSE Bug 1086652", "url": "https://bugzilla.suse.com/1086652" }, { "category": "self", "summary": "SUSE Bug 1087081", "url": "https://bugzilla.suse.com/1087081" }, { "category": "self", "summary": "SUSE Bug 1089343", "url": "https://bugzilla.suse.com/1089343" }, { "category": "self", "summary": "SUSE Bug 1090123", "url": "https://bugzilla.suse.com/1090123" }, { "category": "self", "summary": "SUSE Bug 1091171", "url": "https://bugzilla.suse.com/1091171" }, { "category": "self", "summary": "SUSE Bug 1094248", "url": "https://bugzilla.suse.com/1094248" }, { "category": "self", "summary": "SUSE Bug 1096130", "url": "https://bugzilla.suse.com/1096130" }, { "category": "self", "summary": "SUSE Bug 1096480", "url": "https://bugzilla.suse.com/1096480" }, { "category": "self", "summary": "SUSE Bug 1096978", "url": "https://bugzilla.suse.com/1096978" }, { "category": "self", "summary": "SUSE Bug 1097140", "url": "https://bugzilla.suse.com/1097140" }, { "category": "self", "summary": "SUSE Bug 1097551", "url": "https://bugzilla.suse.com/1097551" }, { "category": "self", "summary": "SUSE Bug 1098016", "url": "https://bugzilla.suse.com/1098016" }, { "category": "self", "summary": "SUSE Bug 1098425", "url": "https://bugzilla.suse.com/1098425" }, { "category": "self", "summary": "SUSE Bug 1098435", "url": "https://bugzilla.suse.com/1098435" }, { "category": "self", "summary": "SUSE Bug 1099924", "url": "https://bugzilla.suse.com/1099924" }, { "category": "self", "summary": "SUSE Bug 1100089", "url": "https://bugzilla.suse.com/1100089" }, { "category": "self", "summary": "SUSE Bug 1100416", "url": "https://bugzilla.suse.com/1100416" }, { "category": "self", "summary": "SUSE Bug 1100418", "url": "https://bugzilla.suse.com/1100418" }, { "category": "self", "summary": "SUSE Bug 1100491", "url": "https://bugzilla.suse.com/1100491" }, { "category": "self", "summary": "SUSE Bug 1101557", "url": "https://bugzilla.suse.com/1101557" }, { "category": "self", "summary": "SUSE Bug 1102340", "url": "https://bugzilla.suse.com/1102340" }, { "category": "self", "summary": "SUSE Bug 1102851", "url": "https://bugzilla.suse.com/1102851" }, { "category": "self", "summary": "SUSE Bug 1103097", "url": "https://bugzilla.suse.com/1103097" }, { "category": "self", "summary": "SUSE Bug 1103119", "url": "https://bugzilla.suse.com/1103119" }, { "category": "self", "summary": "SUSE Bug 1103580", "url": "https://bugzilla.suse.com/1103580" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18344 page", "url": "https://www.suse.com/security/cve/CVE-2017-18344/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13053 page", "url": "https://www.suse.com/security/cve/CVE-2018-13053/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13405 page", "url": "https://www.suse.com/security/cve/CVE-2018-13405/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13406 page", "url": "https://www.suse.com/security/cve/CVE-2018-13406/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14734 page", "url": "https://www.suse.com/security/cve/CVE-2018-14734/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3620 page", "url": "https://www.suse.com/security/cve/CVE-2018-3620/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5391 page", "url": "https://www.suse.com/security/cve/CVE-2018-5391/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5814 page", "url": "https://www.suse.com/security/cve/CVE-2018-5814/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-9385 page", "url": "https://www.suse.com/security/cve/CVE-2018-9385/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-08-16T07:06:02Z", "generator": { "date": "2018-08-16T07:06:02Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2344-1", "initial_release_date": "2018-08-16T07:06:02Z", "revision_history": [ { "date": "2018-08-16T07:06:02Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.121-92.92.1.noarch", "product": { "name": "kernel-devel-4.4.121-92.92.1.noarch", "product_id": "kernel-devel-4.4.121-92.92.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.121-92.92.1.noarch", "product": { "name": "kernel-macros-4.4.121-92.92.1.noarch", "product_id": "kernel-macros-4.4.121-92.92.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.121-92.92.1.noarch", "product": { "name": "kernel-source-4.4.121-92.92.1.noarch", "product_id": "kernel-source-4.4.121-92.92.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "product_id": "cluster-md-kmp-default-4.4.121-92.92.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "product": { "name": "cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "product_id": "cluster-network-kmp-default-4.4.121-92.92.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.92.1.ppc64le", "product": { "name": "dlm-kmp-default-4.4.121-92.92.1.ppc64le", "product_id": "dlm-kmp-default-4.4.121-92.92.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "product_id": "gfs2-kmp-default-4.4.121-92.92.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "product_id": "ocfs2-kmp-default-4.4.121-92.92.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.92.1.ppc64le", "product": { "name": "kernel-default-4.4.121-92.92.1.ppc64le", "product_id": "kernel-default-4.4.121-92.92.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.92.1.ppc64le", "product": { "name": "kernel-default-base-4.4.121-92.92.1.ppc64le", "product_id": "kernel-default-base-4.4.121-92.92.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.92.1.ppc64le", "product": { "name": "kernel-default-devel-4.4.121-92.92.1.ppc64le", "product_id": "kernel-default-devel-4.4.121-92.92.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.92.1.ppc64le", "product": { "name": "kernel-syms-4.4.121-92.92.1.ppc64le", "product_id": "kernel-syms-4.4.121-92.92.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.4.121-92.92.1.s390x", "product": { "name": "kernel-default-4.4.121-92.92.1.s390x", "product_id": "kernel-default-4.4.121-92.92.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.92.1.s390x", "product": { "name": "kernel-default-base-4.4.121-92.92.1.s390x", "product_id": "kernel-default-base-4.4.121-92.92.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.92.1.s390x", "product": { "name": "kernel-default-devel-4.4.121-92.92.1.s390x", "product_id": "kernel-default-devel-4.4.121-92.92.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.121-92.92.1.s390x", "product": { "name": "kernel-default-man-4.4.121-92.92.1.s390x", "product_id": "kernel-default-man-4.4.121-92.92.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.92.1.s390x", "product": { "name": "kernel-syms-4.4.121-92.92.1.s390x", "product_id": "kernel-syms-4.4.121-92.92.1.s390x" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.92.1.s390x", "product": { "name": "cluster-md-kmp-default-4.4.121-92.92.1.s390x", "product_id": "cluster-md-kmp-default-4.4.121-92.92.1.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.92.1.s390x", "product": { "name": "cluster-network-kmp-default-4.4.121-92.92.1.s390x", "product_id": "cluster-network-kmp-default-4.4.121-92.92.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.92.1.s390x", "product": { "name": "dlm-kmp-default-4.4.121-92.92.1.s390x", "product_id": "dlm-kmp-default-4.4.121-92.92.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.92.1.s390x", "product": { "name": "gfs2-kmp-default-4.4.121-92.92.1.s390x", "product_id": "gfs2-kmp-default-4.4.121-92.92.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.92.1.s390x", "product": { "name": "ocfs2-kmp-default-4.4.121-92.92.1.s390x", "product_id": "ocfs2-kmp-default-4.4.121-92.92.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.4.121-92.92.1.x86_64", "product": { "name": "kernel-default-4.4.121-92.92.1.x86_64", "product_id": "kernel-default-4.4.121-92.92.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.92.1.x86_64", "product": { "name": "kernel-default-base-4.4.121-92.92.1.x86_64", "product_id": "kernel-default-base-4.4.121-92.92.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.92.1.x86_64", "product": { "name": "kernel-default-devel-4.4.121-92.92.1.x86_64", "product_id": "kernel-default-devel-4.4.121-92.92.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.92.1.x86_64", "product": { "name": "kernel-syms-4.4.121-92.92.1.x86_64", "product_id": "kernel-syms-4.4.121-92.92.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "product_id": "kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64" } }, { "category": "product_version", "name": "lttng-modules-2.7.1-9.4.1.x86_64", "product": { "name": "lttng-modules-2.7.1-9.4.1.x86_64", "product_id": "lttng-modules-2.7.1-9.4.1.x86_64" } }, { "category": "product_version", "name": "lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "product": { "name": "lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "product_id": "lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "product_id": "cluster-md-kmp-default-4.4.121-92.92.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "product": { "name": "cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "product_id": "cluster-network-kmp-default-4.4.121-92.92.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.92.1.x86_64", "product": { "name": "dlm-kmp-default-4.4.121-92.92.1.x86_64", "product_id": "dlm-kmp-default-4.4.121-92.92.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.92.1.x86_64", "product": { "name": "gfs2-kmp-default-4.4.121-92.92.1.x86_64", "product_id": "gfs2-kmp-default-4.4.121-92.92.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "product_id": "ocfs2-kmp-default-4.4.121-92.92.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 7", "product": { "name": "SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:7" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 4", "product": { "name": "SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.92.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x" }, "product_reference": "kernel-default-4.4.121-92.92.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.92.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.92.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x" }, "product_reference": "kernel-default-base-4.4.121-92.92.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.92.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.92.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x" }, "product_reference": "kernel-default-devel-4.4.121-92.92.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.92.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.121-92.92.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x" }, "product_reference": "kernel-default-man-4.4.121-92.92.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.92.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.92.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.92.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.92.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.92.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.92.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.92.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x" }, "product_reference": "kernel-syms-4.4.121-92.92.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.92.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-2.7.1-9.4.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64" }, "product_reference": "lttng-modules-2.7.1-9.4.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" }, "product_reference": "lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.121-92.92.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.121-92.92.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.4.121-92.92.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.121-92.92.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.121-92.92.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le" }, "product_reference": "cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.121-92.92.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x" }, "product_reference": "cluster-network-kmp-default-4.4.121-92.92.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.121-92.92.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64" }, "product_reference": "cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.121-92.92.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.4.121-92.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.121-92.92.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x" }, "product_reference": "dlm-kmp-default-4.4.121-92.92.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.121-92.92.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64" }, "product_reference": "dlm-kmp-default-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.121-92.92.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.121-92.92.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x" }, "product_reference": "gfs2-kmp-default-4.4.121-92.92.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.121-92.92.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.121-92.92.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.121-92.92.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.4.121-92.92.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.121-92.92.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le" }, "product_reference": "kernel-default-4.4.121-92.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.121-92.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.121-92.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.92.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.92.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.92.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le" }, "product_reference": "kernel-syms-4.4.121-92.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-2.7.1-9.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64" }, "product_reference": "lttng-modules-2.7.1-9.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" }, "product_reference": "lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.92.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le" }, "product_reference": "kernel-default-4.4.121-92.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.92.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x" }, "product_reference": "kernel-default-4.4.121-92.92.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.92.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.92.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.121-92.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.92.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x" }, "product_reference": "kernel-default-base-4.4.121-92.92.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.92.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.92.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.121-92.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.92.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x" }, "product_reference": "kernel-default-devel-4.4.121-92.92.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.92.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.121-92.92.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x" }, "product_reference": "kernel-default-man-4.4.121-92.92.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.92.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.92.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.92.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.92.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le" }, "product_reference": "kernel-syms-4.4.121-92.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.92.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x" }, "product_reference": "kernel-syms-4.4.121-92.92.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.92.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-2.7.1-9.4.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64" }, "product_reference": "lttng-modules-2.7.1-9.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" }, "product_reference": "lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.92.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.92.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.92.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.92.1.noarch as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.92.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.92.1.noarch as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.92.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.92.1.noarch as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.92.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.92.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.92.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-2.7.1-9.4.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64" }, "product_reference": "lttng-modules-2.7.1-9.4.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" }, "product_reference": "lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-18344", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18344" } ], "notes": [ { "category": "general", "text": "The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18344", "url": "https://www.suse.com/security/cve/CVE-2017-18344" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102851 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1102851" }, { "category": "external", "summary": "SUSE Bug 1103203 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103203" }, { "category": "external", "summary": "SUSE Bug 1103580 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103580" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:06:02Z", "details": "moderate" } ], "title": "CVE-2017-18344" }, { "cve": "CVE-2018-13053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13053" } ], "notes": [ { "category": "general", "text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13053", "url": "https://www.suse.com/security/cve/CVE-2018-13053" }, { "category": "external", "summary": "SUSE Bug 1099924 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1099924" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:06:02Z", "details": "low" } ], "title": "CVE-2018-13053" }, { "cve": "CVE-2018-13405", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13405" } ], "notes": [ { "category": "general", "text": "The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13405", "url": "https://www.suse.com/security/cve/CVE-2018-13405" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1100416 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1100416" }, { "category": "external", "summary": "SUSE Bug 1129735 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1129735" }, { "category": "external", "summary": "SUSE Bug 1195161 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1195161" }, { "category": "external", "summary": "SUSE Bug 1198702 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1198702" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:06:02Z", "details": "moderate" } ], "title": "CVE-2018-13405" }, { "cve": "CVE-2018-13406", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13406" } ], "notes": [ { "category": "general", "text": "An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c in the Linux kernel before 4.17.4 could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13406", "url": "https://www.suse.com/security/cve/CVE-2018-13406" }, { "category": "external", "summary": "SUSE Bug 1098016 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1098016" }, { "category": "external", "summary": "SUSE Bug 1100418 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1100418" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:06:02Z", "details": "moderate" } ], "title": "CVE-2018-13406" }, { "cve": "CVE-2018-14734", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14734" } ], "notes": [ { "category": "general", "text": "drivers/infiniband/core/ucma.c in the Linux kernel through 4.17.11 allows ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14734", "url": "https://www.suse.com/security/cve/CVE-2018-14734" }, { "category": "external", "summary": "SUSE Bug 1103119 for CVE-2018-14734", "url": "https://bugzilla.suse.com/1103119" }, { "category": "external", "summary": "SUSE Bug 1131390 for CVE-2018-14734", "url": "https://bugzilla.suse.com/1131390" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:06:02Z", "details": "low" } ], "title": "CVE-2018-14734" }, { "cve": "CVE-2018-3620", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3620" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3620", "url": "https://www.suse.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1090340 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1090340" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:06:02Z", "details": "moderate" } ], "title": "CVE-2018-3620" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:06:02Z", "details": "important" } ], "title": "CVE-2018-3646" }, { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:06:02Z", "details": "moderate" } ], "title": "CVE-2018-5390" }, { "cve": "CVE-2018-5391", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5391" } ], "notes": [ { "category": "general", "text": "The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5391", "url": "https://www.suse.com/security/cve/CVE-2018-5391" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1108654 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1108654" }, { "category": "external", "summary": "SUSE Bug 1114071 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1114071" }, { "category": "external", "summary": "SUSE Bug 1121102 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1121102" }, { "category": "external", "summary": "SUSE Bug 1134140 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1134140" }, { "category": "external", "summary": "SUSE Bug 1181460 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1181460" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:06:02Z", "details": "moderate" } ], "title": "CVE-2018-5391" }, { "cve": "CVE-2018-5814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5814" } ], "notes": [ { "category": "general", "text": "In the Linux Kernel before version 4.16.11, 4.14.43, 4.9.102, and 4.4.133, multiple race condition errors when handling probe, disconnect, and rebind operations can be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5814", "url": "https://www.suse.com/security/cve/CVE-2018-5814" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5814", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1096480 for CVE-2018-5814", "url": "https://bugzilla.suse.com/1096480" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2018-5814", "url": "https://bugzilla.suse.com/1133319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:06:02Z", "details": "moderate" } ], "title": "CVE-2018-5814" }, { "cve": "CVE-2018-9385", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-9385" } ], "notes": [ { "category": "general", "text": "In driver_override_store of bus.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-74128061 References: Upstream kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-9385", "url": "https://www.suse.com/security/cve/CVE-2018-9385" }, { "category": "external", "summary": "SUSE Bug 1100491 for CVE-2018-9385", "url": "https://bugzilla.suse.com/1100491" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.92.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Enterprise Storage 4:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.92.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.92.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_92-default-1-3.7.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-2.7.1-9.4.1.x86_64", "SUSE OpenStack Cloud 7:lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:06:02Z", "details": "moderate" } ], "title": "CVE-2018-9385" } ] }
suse-su-2018:2347-1
Vulnerability from csaf_suse
Published
2018-08-16 06:06
Modified
2018-08-16 06:06
Summary
Security update for the Linux Kernel (Live Patch 29 for SLE 12)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 29 for SLE 12)
Description of the patch
This update for the Linux Kernel 3.12.61-52_106 fixes several issues.
The following security issues were fixed:
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2017-11600: net/xfrm/xfrm_policy.c did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bsc#1096564)
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
Patchnames
SUSE-SLE-SERVER-12-2018-1591
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 29 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_106 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).\n- CVE-2017-11600: net/xfrm/xfrm_policy.c did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bsc#1096564) \n- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn\u0027t propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-1591", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2347-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2347-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182347-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2347-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004430.html" }, { "category": "self", "summary": "SUSE Bug 1096564", "url": "https://bugzilla.suse.com/1096564" }, { "category": "self", "summary": "SUSE Bug 1097108", "url": "https://bugzilla.suse.com/1097108" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE CVE CVE-2017-11600 page", "url": "https://www.suse.com/security/cve/CVE-2017-11600/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for the Linux Kernel (Live Patch 29 for SLE 12)", "tracking": { "current_release_date": "2018-08-16T06:06:13Z", "generator": { "date": "2018-08-16T06:06:13Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2347-1", "initial_release_date": "2018-08-16T06:06:13Z", "revision_history": [ { "date": "2018-08-16T06:06:13Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_106-default-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_106-default-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_106-default-8-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_106-xen-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_106-xen-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_106-xen-8-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-11600", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-11600" } ], "notes": [ { "category": "general", "text": "net/xfrm/xfrm_policy.c in the Linux kernel through 4.12.3, when CONFIG_XFRM_MIGRATE is enabled, does not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allows local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-11600", "url": "https://www.suse.com/security/cve/CVE-2017-11600" }, { "category": "external", "summary": "SUSE Bug 1050231 for CVE-2017-11600", "url": "https://bugzilla.suse.com/1050231" }, { "category": "external", "summary": "SUSE Bug 1096564 for CVE-2017-11600", "url": "https://bugzilla.suse.com/1096564" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-11600", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:06:13Z", "details": "important" } ], "title": "CVE-2017-11600" }, { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:06:13Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:06:13Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2474-1
Vulnerability from csaf_suse
Published
2018-08-21 15:13
Modified
2018-08-21 15:13
Summary
Security update for the Linux Kernel (Live Patch 0 for SLE 15)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 0 for SLE 15)
Description of the patch
This update for the Linux Kernel 4.12.14-23 fixes several issues.
The following security issues were fixed:
- CVE-2018-5390: Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102682).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn't properly validate the sigevent->sigev_notify field, which lead to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bsc#1103203).
before 4.14.8
- CVE-2018-12904: In arch/x86/kvm/vmx.c local attackers could cause L1 KVM guests to VMEXIT, potentially allowing privilege escalations and denial of service attacks due to lack of checking of CPL (bsc#1099258).
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
Patchnames
SUSE-SLE-Module-Live-Patching-15-2018-1739
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 0 for SLE 15)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-23 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-5390: Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102682).\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).\n- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn\u0027t properly validate the sigevent-\u003esigev_notify field, which lead to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bsc#1103203).\nbefore 4.14.8\n- CVE-2018-12904: In arch/x86/kvm/vmx.c local attackers could cause L1 KVM guests to VMEXIT, potentially allowing privilege escalations and denial of service attacks due to lack of checking of CPL (bsc#1099258).\n- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn\u0027t propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Live-Patching-15-2018-1739", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2474-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2474-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182474-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2474-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004487.html" }, { "category": "self", "summary": "SUSE Bug 1097108", "url": "https://bugzilla.suse.com/1097108" }, { "category": "self", "summary": "SUSE Bug 1099258", "url": "https://bugzilla.suse.com/1099258" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE Bug 1102682", "url": "https://bugzilla.suse.com/1102682" }, { "category": "self", "summary": "SUSE Bug 1103203", "url": "https://bugzilla.suse.com/1103203" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18344 page", "url": "https://www.suse.com/security/cve/CVE-2017-18344/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12904 page", "url": "https://www.suse.com/security/cve/CVE-2018-12904/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" } ], "title": "Security update for the Linux Kernel (Live Patch 0 for SLE 15)", "tracking": { "current_release_date": "2018-08-21T15:13:27Z", "generator": { "date": "2018-08-21T15:13:27Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2474-1", "initial_release_date": "2018-08-21T15:13:27Z", "revision_history": [ { "date": "2018-08-21T15:13:27Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-4_12_14-23-default-2-4.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-23-default-2-4.1.x86_64", "product_id": "kernel-livepatch-4_12_14-23-default-2-4.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-23-default-2-4.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-23-default-2-4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-18344", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18344" } ], "notes": [ { "category": "general", "text": "The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18344", "url": "https://www.suse.com/security/cve/CVE-2017-18344" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102851 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1102851" }, { "category": "external", "summary": "SUSE Bug 1103203 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103203" }, { "category": "external", "summary": "SUSE Bug 1103580 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103580" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-21T15:13:27Z", "details": "moderate" } ], "title": "CVE-2017-18344" }, { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-21T15:13:27Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-12904", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12904" } ], "notes": [ { "category": "general", "text": "In arch/x86/kvm/vmx.c in the Linux kernel before 4.17.2, when nested virtualization is used, local attackers could cause L1 KVM guests to VMEXIT, potentially allowing privilege escalations and denial of service attacks due to lack of checking of CPL.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12904", "url": "https://www.suse.com/security/cve/CVE-2018-12904" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-12904", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099183 for CVE-2018-12904", "url": "https://bugzilla.suse.com/1099183" }, { "category": "external", "summary": "SUSE Bug 1099258 for CVE-2018-12904", "url": "https://bugzilla.suse.com/1099258" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-21T15:13:27Z", "details": "important" } ], "title": "CVE-2018-12904" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-21T15:13:27Z", "details": "important" } ], "title": "CVE-2018-3646" }, { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-23-default-2-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-21T15:13:27Z", "details": "moderate" } ], "title": "CVE-2018-5390" } ] }
suse-su-2018:2331-1
Vulnerability from csaf_suse
Published
2018-08-15 11:50
Modified
2018-08-15 11:50
Summary
Security update to ucode-intel
Notes
Title of the patch
Security update to ucode-intel
Description of the patch
ucode-intel was updated to the 20180807 release.
For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a) and is
part of the mitigations for CVE-2018-3639 (Spectre v4) and CVE-2018-3646
(L1 Terminal fault).
(bsc#1104134 bsc#1087082 bsc#1087083 bsc#1089343)
Processor Identifier Version Products
Model Stepping F-MO-S/PI Old->New
---- new platforms ----------------------------------------
WSM-EP/WS U1 6-2c-2/03 0000001f Xeon E/L/X56xx, W36xx
NHM-EX D0 6-2e-6/04 0000000d Xeon E/L/X65xx/75xx
BXT C0 6-5c-2/01 00000014 Atom T5500/5700
APL E0 6-5c-a/03 0000000c Atom x5-E39xx
DVN B0 6-5f-1/01 00000024 Atom C3xxx
---- updated platforms ------------------------------------
NHM-EP/WS D0 6-1a-5/03 00000019->0000001d Xeon E/L/X/W55xx
NHM B1 6-1e-5/13 00000007->0000000a Core i7-8xx, i5-7xx; Xeon L3426, X24xx
WSM B1 6-25-2/12 0000000e->00000011 Core i7-6xx, i5-6xx/4xxM, i3-5xx/3xxM, Pentium G69xx, Celeon P45xx; Xeon L3406
WSM K0 6-25-5/92 00000004->00000007 Core i7-6xx, i5-6xx/5xx/4xx, i3-5xx/3xx, Pentium G69xx/P6xxx/U5xxx, Celeron P4xxx/U3xxx
SNB D2 6-2a-7/12 0000002d->0000002e Core Gen2; Xeon E3
WSM-EX A2 6-2f-2/05 00000037->0000003b Xeon E7
IVB E2 6-3a-9/12 0000001f->00000020 Core Gen3 Mobile
HSW-H/S/E3 Cx/Dx 6-3c-3/32 00000024->00000025 Core Gen4 Desktop; Xeon E3 v3
BDW-U/Y E/F 6-3d-4/c0 0000002a->0000002b Core Gen5 Mobile
HSW-ULT Cx/Dx 6-45-1/72 00000023->00000024 Core Gen4 Mobile and derived Pentium/Celeron
HSW-H Cx 6-46-1/32 00000019->0000001a Core Extreme i7-5xxxX
BDW-H/E3 E/G 6-47-1/22 0000001d->0000001e Core i5-5xxxR/C, i7-5xxxHQ/EQ; Xeon E3 v4
SKL-U/Y D0 6-4e-3/c0 000000c2->000000c6 Core Gen6 Mobile
BDX-DE V1 6-56-2/10 00000015->00000017 Xeon D-1520/40
BDX-DE V2/3 6-56-3/10 07000012->07000013 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
BDX-DE Y0 6-56-4/10 0f000011->0f000012 Xeon D-1557/59/67/71/77/81/87
APL D0 6-5c-9/03 0000002c->00000032 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
SKL-H/S/E3 R0 6-5e-3/36 000000c2->000000c6 Core Gen6; Xeon E3 v5
Patchnames
SUSE-OpenStack-Cloud-7-2018-1573,SUSE-SLE-DESKTOP-12-SP3-2018-1573,SUSE-SLE-SAP-12-SP1-2018-1573,SUSE-SLE-SAP-12-SP2-2018-1573,SUSE-SLE-SERVER-12-2018-1573,SUSE-SLE-SERVER-12-SP1-2018-1573,SUSE-SLE-SERVER-12-SP2-2018-1573,SUSE-SLE-SERVER-12-SP3-2018-1573,SUSE-Storage-4-2018-1573
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update to ucode-intel", "title": "Title of the patch" }, { "category": "description", "text": "\nucode-intel was updated to the 20180807 release.\n\nFor the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a) and is\npart of the mitigations for CVE-2018-3639 (Spectre v4) and CVE-2018-3646\n(L1 Terminal fault).\n(bsc#1104134 bsc#1087082 bsc#1087083 bsc#1089343)\n\n Processor Identifier Version Products\n\n Model Stepping F-MO-S/PI Old-\u003eNew\n\n ---- new platforms ----------------------------------------\n WSM-EP/WS U1 6-2c-2/03 0000001f Xeon E/L/X56xx, W36xx\n NHM-EX D0 6-2e-6/04 0000000d Xeon E/L/X65xx/75xx\n BXT C0 6-5c-2/01 00000014 Atom T5500/5700\n APL E0 6-5c-a/03 0000000c Atom x5-E39xx\n DVN B0 6-5f-1/01 00000024 Atom C3xxx\n ---- updated platforms ------------------------------------\n NHM-EP/WS D0 6-1a-5/03 00000019-\u003e0000001d Xeon E/L/X/W55xx\n NHM B1 6-1e-5/13 00000007-\u003e0000000a Core i7-8xx, i5-7xx; Xeon L3426, X24xx\n WSM B1 6-25-2/12 0000000e-\u003e00000011 Core i7-6xx, i5-6xx/4xxM, i3-5xx/3xxM, Pentium G69xx, Celeon P45xx; Xeon L3406\n WSM K0 6-25-5/92 00000004-\u003e00000007 Core i7-6xx, i5-6xx/5xx/4xx, i3-5xx/3xx, Pentium G69xx/P6xxx/U5xxx, Celeron P4xxx/U3xxx\n SNB D2 6-2a-7/12 0000002d-\u003e0000002e Core Gen2; Xeon E3\n WSM-EX A2 6-2f-2/05 00000037-\u003e0000003b Xeon E7\n IVB E2 6-3a-9/12 0000001f-\u003e00000020 Core Gen3 Mobile\n HSW-H/S/E3 Cx/Dx 6-3c-3/32 00000024-\u003e00000025 Core Gen4 Desktop; Xeon E3 v3\n BDW-U/Y E/F 6-3d-4/c0 0000002a-\u003e0000002b Core Gen5 Mobile\n HSW-ULT Cx/Dx 6-45-1/72 00000023-\u003e00000024 Core Gen4 Mobile and derived Pentium/Celeron\n HSW-H Cx 6-46-1/32 00000019-\u003e0000001a Core Extreme i7-5xxxX\n BDW-H/E3 E/G 6-47-1/22 0000001d-\u003e0000001e Core i5-5xxxR/C, i7-5xxxHQ/EQ; Xeon E3 v4\n SKL-U/Y D0 6-4e-3/c0 000000c2-\u003e000000c6 Core Gen6 Mobile\n BDX-DE V1 6-56-2/10 00000015-\u003e00000017 Xeon D-1520/40\n BDX-DE V2/3 6-56-3/10 07000012-\u003e07000013 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19\n BDX-DE Y0 6-56-4/10 0f000011-\u003e0f000012 Xeon D-1557/59/67/71/77/81/87\n APL D0 6-5c-9/03 0000002c-\u003e00000032 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx\n SKL-H/S/E3 R0 6-5e-3/36 000000c2-\u003e000000c6 Core Gen6; Xeon E3 v5\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-OpenStack-Cloud-7-2018-1573,SUSE-SLE-DESKTOP-12-SP3-2018-1573,SUSE-SLE-SAP-12-SP1-2018-1573,SUSE-SLE-SAP-12-SP2-2018-1573,SUSE-SLE-SERVER-12-2018-1573,SUSE-SLE-SERVER-12-SP1-2018-1573,SUSE-SLE-SERVER-12-SP2-2018-1573,SUSE-SLE-SERVER-12-SP3-2018-1573,SUSE-Storage-4-2018-1573", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2331-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2331-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182331-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2331-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004416.html" }, { "category": "self", "summary": "SUSE Bug 1087082", "url": "https://bugzilla.suse.com/1087082" }, { "category": "self", "summary": "SUSE Bug 1087083", "url": "https://bugzilla.suse.com/1087083" }, { "category": "self", "summary": "SUSE Bug 1089343", "url": "https://bugzilla.suse.com/1089343" }, { "category": "self", "summary": "SUSE Bug 1104134", "url": "https://bugzilla.suse.com/1104134" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3639 page", "url": "https://www.suse.com/security/cve/CVE-2018-3639/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3640 page", "url": "https://www.suse.com/security/cve/CVE-2018-3640/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update to ucode-intel", "tracking": { "current_release_date": "2018-08-15T11:50:29Z", "generator": { "date": "2018-08-15T11:50:29Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2331-1", "initial_release_date": "2018-08-15T11:50:29Z", "revision_history": [ { "date": "2018-08-15T11:50:29Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ucode-intel-20180807-13.29.1.x86_64", "product": { "name": "ucode-intel-20180807-13.29.1.x86_64", "product_id": "ucode-intel-20180807-13.29.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 7", "product": { "name": "SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:7" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3", "product": { "name": "SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 4", "product": { "name": "SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20180807-13.29.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:ucode-intel-20180807-13.29.1.x86_64" }, "product_reference": "ucode-intel-20180807-13.29.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20180807-13.29.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:ucode-intel-20180807-13.29.1.x86_64" }, "product_reference": "ucode-intel-20180807-13.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20180807-13.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-intel-20180807-13.29.1.x86_64" }, "product_reference": "ucode-intel-20180807-13.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20180807-13.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20180807-13.29.1.x86_64" }, "product_reference": "ucode-intel-20180807-13.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20180807-13.29.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:ucode-intel-20180807-13.29.1.x86_64" }, "product_reference": "ucode-intel-20180807-13.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20180807-13.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-intel-20180807-13.29.1.x86_64" }, "product_reference": "ucode-intel-20180807-13.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20180807-13.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20180807-13.29.1.x86_64" }, "product_reference": "ucode-intel-20180807-13.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20180807-13.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:ucode-intel-20180807-13.29.1.x86_64" }, "product_reference": "ucode-intel-20180807-13.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20180807-13.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20180807-13.29.1.x86_64" }, "product_reference": "ucode-intel-20180807-13.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ucode-intel-20180807-13.29.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:ucode-intel-20180807-13.29.1.x86_64" }, "product_reference": "ucode-intel-20180807-13.29.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-3639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3639" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20180807-13.29.1.x86_64", "SUSE OpenStack Cloud 7:ucode-intel-20180807-13.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3639", "url": "https://www.suse.com/security/cve/CVE-2018-3639" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1085235 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085235" }, { "category": "external", "summary": "SUSE Bug 1085308 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085308" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092631 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092631" }, { "category": "external", "summary": "SUSE Bug 1092885 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092885" }, { "category": "external", "summary": "SUSE Bug 1094912 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1094912" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100394 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1100394" }, { "category": "external", "summary": "SUSE Bug 1102640 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1102640" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1105412" }, { "category": "external", "summary": "SUSE Bug 1111963 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1111963" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172781" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172782" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172783" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20180807-13.29.1.x86_64", "SUSE OpenStack Cloud 7:ucode-intel-20180807-13.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20180807-13.29.1.x86_64", "SUSE OpenStack Cloud 7:ucode-intel-20180807-13.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T11:50:29Z", "details": "moderate" } ], "title": "CVE-2018-3639" }, { "cve": "CVE-2018-3640", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3640" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20180807-13.29.1.x86_64", "SUSE OpenStack Cloud 7:ucode-intel-20180807-13.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3640", "url": "https://www.suse.com/security/cve/CVE-2018-3640" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087083 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1087083" }, { "category": "external", "summary": "SUSE Bug 1094912 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1094912" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100394 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1100394" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1175912 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1175912" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20180807-13.29.1.x86_64", "SUSE OpenStack Cloud 7:ucode-intel-20180807-13.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20180807-13.29.1.x86_64", "SUSE OpenStack Cloud 7:ucode-intel-20180807-13.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T11:50:29Z", "details": "moderate" } ], "title": "CVE-2018-3640" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20180807-13.29.1.x86_64", "SUSE OpenStack Cloud 7:ucode-intel-20180807-13.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20180807-13.29.1.x86_64", "SUSE OpenStack Cloud 7:ucode-intel-20180807-13.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20180807-13.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20180807-13.29.1.x86_64", "SUSE OpenStack Cloud 7:ucode-intel-20180807-13.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T11:50:29Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2364-1
Vulnerability from csaf_suse
Published
2018-08-16 06:06
Modified
2018-08-16 06:06
Summary
Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP1)
Description of the patch
This update for the Linux Kernel 3.12.74-60_64_93 fixes several issues.
The following security issues were fixed:
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
Patchnames
SUSE-SLE-SAP-12-SP1-2018-1593,SUSE-SLE-SERVER-12-SP1-2018-1593
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_93 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).\n- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn\u0027t propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-1593,SUSE-SLE-SERVER-12-SP1-2018-1593", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2364-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2364-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182364-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2364-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004444.html" }, { "category": "self", "summary": "SUSE Bug 1097108", "url": "https://bugzilla.suse.com/1097108" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-08-16T06:06:23Z", "generator": { "date": "2018-08-16T06:06:23Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2364-1", "initial_release_date": "2018-08-16T06:06:23Z", "revision_history": [ { "date": "2018-08-16T06:06:23Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_93-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_93-default-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_93-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_93-xen-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_93-xen-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_93-xen-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_93-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_93-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:06:23Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:06:23Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2335-1
Vulnerability from csaf_suse
Published
2018-08-15 14:01
Modified
2018-08-15 14:01
Summary
Security update to ucode-intel
Notes
Title of the patch
Security update to ucode-intel
Description of the patch
ucode-intel was updated to the 20180807 release.
For the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a), and is part of the
mitigations for CVE-2018-3639 (Spectre v4) and CVE-2018-3646 (L1 Terminal Fault).
(bsc#1104134 bsc#1087082 bsc#1087083 bsc#1089343)
Processor Identifier Version Products
Model Stepping F-MO-S/PI Old->New
---- new platforms ----------------------------------------
WSM-EP/WS U1 6-2c-2/03 0000001f Xeon E/L/X56xx, W36xx
NHM-EX D0 6-2e-6/04 0000000d Xeon E/L/X65xx/75xx
BXT C0 6-5c-2/01 00000014 Atom T5500/5700
APL E0 6-5c-a/03 0000000c Atom x5-E39xx
DVN B0 6-5f-1/01 00000024 Atom C3xxx
---- updated platforms ------------------------------------
NHM-EP/WS D0 6-1a-5/03 00000019->0000001d Xeon E/L/X/W55xx
NHM B1 6-1e-5/13 00000007->0000000a Core i7-8xx, i5-7xx; Xeon L3426, X24xx
WSM B1 6-25-2/12 0000000e->00000011 Core i7-6xx, i5-6xx/4xxM, i3-5xx/3xxM, Pentium G69xx, Celeon P45xx; Xeon L3406
WSM K0 6-25-5/92 00000004->00000007 Core i7-6xx, i5-6xx/5xx/4xx, i3-5xx/3xx, Pentium G69xx/P6xxx/U5xxx, Celeron P4xxx/U3xxx
SNB D2 6-2a-7/12 0000002d->0000002e Core Gen2; Xeon E3
WSM-EX A2 6-2f-2/05 00000037->0000003b Xeon E7
IVB E2 6-3a-9/12 0000001f->00000020 Core Gen3 Mobile
HSW-H/S/E3 Cx/Dx 6-3c-3/32 00000024->00000025 Core Gen4 Desktop; Xeon E3 v3
BDW-U/Y E/F 6-3d-4/c0 0000002a->0000002b Core Gen5 Mobile
HSW-ULT Cx/Dx 6-45-1/72 00000023->00000024 Core Gen4 Mobile and derived Pentium/Celeron
HSW-H Cx 6-46-1/32 00000019->0000001a Core Extreme i7-5xxxX
BDW-H/E3 E/G 6-47-1/22 0000001d->0000001e Core i5-5xxxR/C, i7-5xxxHQ/EQ; Xeon E3 v4
SKL-U/Y D0 6-4e-3/c0 000000c2->000000c6 Core Gen6 Mobile
BDX-DE V1 6-56-2/10 00000015->00000017 Xeon D-1520/40
BDX-DE V2/3 6-56-3/10 07000012->07000013 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
BDX-DE Y0 6-56-4/10 0f000011->0f000012 Xeon D-1557/59/67/71/77/81/87
APL D0 6-5c-9/03 0000002c->00000032 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
SKL-H/S/E3 R0 6-5e-3/36 000000c2->000000c6 Core Gen6; Xeon E3 v5
Patchnames
sleposp3-microcode_ctl-13730,slessp3-microcode_ctl-13730,slessp4-microcode_ctl-13730
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update to ucode-intel", "title": "Title of the patch" }, { "category": "description", "text": "\nucode-intel was updated to the 20180807 release.\n\nFor the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a), and is part of the \nmitigations for CVE-2018-3639 (Spectre v4) and CVE-2018-3646 (L1 Terminal Fault).\n(bsc#1104134 bsc#1087082 bsc#1087083 bsc#1089343)\n\n Processor Identifier Version Products\n\n Model Stepping F-MO-S/PI Old-\u003eNew\n\n ---- new platforms ----------------------------------------\n WSM-EP/WS U1 6-2c-2/03 0000001f Xeon E/L/X56xx, W36xx\n NHM-EX D0 6-2e-6/04 0000000d Xeon E/L/X65xx/75xx\n BXT C0 6-5c-2/01 00000014 Atom T5500/5700\n APL E0 6-5c-a/03 0000000c Atom x5-E39xx\n DVN B0 6-5f-1/01 00000024 Atom C3xxx\n ---- updated platforms ------------------------------------\n NHM-EP/WS D0 6-1a-5/03 00000019-\u003e0000001d Xeon E/L/X/W55xx\n NHM B1 6-1e-5/13 00000007-\u003e0000000a Core i7-8xx, i5-7xx; Xeon L3426, X24xx\n WSM B1 6-25-2/12 0000000e-\u003e00000011 Core i7-6xx, i5-6xx/4xxM, i3-5xx/3xxM, Pentium G69xx, Celeon P45xx; Xeon L3406\n WSM K0 6-25-5/92 00000004-\u003e00000007 Core i7-6xx, i5-6xx/5xx/4xx, i3-5xx/3xx, Pentium G69xx/P6xxx/U5xxx, Celeron P4xxx/U3xxx\n SNB D2 6-2a-7/12 0000002d-\u003e0000002e Core Gen2; Xeon E3\n WSM-EX A2 6-2f-2/05 00000037-\u003e0000003b Xeon E7\n IVB E2 6-3a-9/12 0000001f-\u003e00000020 Core Gen3 Mobile\n HSW-H/S/E3 Cx/Dx 6-3c-3/32 00000024-\u003e00000025 Core Gen4 Desktop; Xeon E3 v3\n BDW-U/Y E/F 6-3d-4/c0 0000002a-\u003e0000002b Core Gen5 Mobile\n HSW-ULT Cx/Dx 6-45-1/72 00000023-\u003e00000024 Core Gen4 Mobile and derived Pentium/Celeron\n HSW-H Cx 6-46-1/32 00000019-\u003e0000001a Core Extreme i7-5xxxX\n BDW-H/E3 E/G 6-47-1/22 0000001d-\u003e0000001e Core i5-5xxxR/C, i7-5xxxHQ/EQ; Xeon E3 v4\n SKL-U/Y D0 6-4e-3/c0 000000c2-\u003e000000c6 Core Gen6 Mobile\n BDX-DE V1 6-56-2/10 00000015-\u003e00000017 Xeon D-1520/40\n BDX-DE V2/3 6-56-3/10 07000012-\u003e07000013 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19\n BDX-DE Y0 6-56-4/10 0f000011-\u003e0f000012 Xeon D-1557/59/67/71/77/81/87\n APL D0 6-5c-9/03 0000002c-\u003e00000032 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx\n SKL-H/S/E3 R0 6-5e-3/36 000000c2-\u003e000000c6 Core Gen6; Xeon E3 v5\n", "title": "Description of the patch" }, { "category": "details", "text": "sleposp3-microcode_ctl-13730,slessp3-microcode_ctl-13730,slessp4-microcode_ctl-13730", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2335-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2335-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182335-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2335-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004419.html" }, { "category": "self", "summary": "SUSE Bug 1087082", "url": "https://bugzilla.suse.com/1087082" }, { "category": "self", "summary": "SUSE Bug 1087083", "url": "https://bugzilla.suse.com/1087083" }, { "category": "self", "summary": "SUSE Bug 1089343", "url": "https://bugzilla.suse.com/1089343" }, { "category": "self", "summary": "SUSE Bug 1104134", "url": "https://bugzilla.suse.com/1104134" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3639 page", "url": "https://www.suse.com/security/cve/CVE-2018-3639/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3640 page", "url": "https://www.suse.com/security/cve/CVE-2018-3640/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update to ucode-intel", "tracking": { "current_release_date": "2018-08-15T14:01:48Z", "generator": { "date": "2018-08-15T14:01:48Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2335-1", "initial_release_date": "2018-08-15T14:01:48Z", "revision_history": [ { "date": "2018-08-15T14:01:48Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "microcode_ctl-1.17-102.83.27.1.i586", "product": { "name": "microcode_ctl-1.17-102.83.27.1.i586", "product_id": "microcode_ctl-1.17-102.83.27.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "microcode_ctl-1.17-102.83.27.1.x86_64", "product": { "name": "microcode_ctl-1.17-102.83.27.1.x86_64", "product_id": "microcode_ctl-1.17-102.83.27.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product": { "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-pos:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp3:teradata" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-1.17-102.83.27.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.27.1.i586" }, "product_reference": "microcode_ctl-1.17-102.83.27.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-1.17-102.83.27.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.i586" }, "product_reference": "microcode_ctl-1.17-102.83.27.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-1.17-102.83.27.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.x86_64" }, "product_reference": "microcode_ctl-1.17-102.83.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-1.17-102.83.27.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.i586" }, "product_reference": "microcode_ctl-1.17-102.83.27.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-1.17-102.83.27.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.x86_64" }, "product_reference": "microcode_ctl-1.17-102.83.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-1.17-102.83.27.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.i586" }, "product_reference": "microcode_ctl-1.17-102.83.27.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-1.17-102.83.27.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64" }, "product_reference": "microcode_ctl-1.17-102.83.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-1.17-102.83.27.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.i586" }, "product_reference": "microcode_ctl-1.17-102.83.27.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "microcode_ctl-1.17-102.83.27.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64" }, "product_reference": "microcode_ctl-1.17-102.83.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-3639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3639" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3639", "url": "https://www.suse.com/security/cve/CVE-2018-3639" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1085235 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085235" }, { "category": "external", "summary": "SUSE Bug 1085308 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085308" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092631 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092631" }, { "category": "external", "summary": "SUSE Bug 1092885 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092885" }, { "category": "external", "summary": "SUSE Bug 1094912 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1094912" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100394 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1100394" }, { "category": "external", "summary": "SUSE Bug 1102640 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1102640" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1105412" }, { "category": "external", "summary": "SUSE Bug 1111963 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1111963" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172781" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172782" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172783" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T14:01:48Z", "details": "moderate" } ], "title": "CVE-2018-3639" }, { "cve": "CVE-2018-3640", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3640" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3640", "url": "https://www.suse.com/security/cve/CVE-2018-3640" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087083 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1087083" }, { "category": "external", "summary": "SUSE Bug 1094912 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1094912" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100394 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1100394" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1175912 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1175912" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3640", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T14:01:48Z", "details": "moderate" } ], "title": "CVE-2018-3640" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T14:01:48Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2387-1
Vulnerability from csaf_suse
Published
2018-08-16 16:00
Modified
2018-08-16 16:00
Summary
Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP2)
Description of the patch
This update for the Linux Kernel 4.4.74-92_38 fixes several issues.
The following security issues were fixed:
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn't properly validate the sigevent->sigev_notify field, which lead to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bsc#1103203).
before 4.14.8
- CVE-2017-11600: net/xfrm/xfrm_policy.c did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bsc#1096564)
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
Patchnames
SUSE-SLE-SAP-12-SP2-2018-1651,SUSE-SLE-SERVER-12-SP2-2018-1651
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.74-92_38 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).\n- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn\u0027t properly validate the sigevent-\u003esigev_notify field, which lead to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bsc#1103203).\nbefore 4.14.8\n- CVE-2017-11600: net/xfrm/xfrm_policy.c did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bsc#1096564) \n- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn\u0027t propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-1651,SUSE-SLE-SERVER-12-SP2-2018-1651", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2387-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2387-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182387-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2387-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004455.html" }, { "category": "self", "summary": "SUSE Bug 1096564", "url": "https://bugzilla.suse.com/1096564" }, { "category": "self", "summary": "SUSE Bug 1097108", "url": "https://bugzilla.suse.com/1097108" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE Bug 1103203", "url": "https://bugzilla.suse.com/1103203" }, { "category": "self", "summary": "SUSE CVE CVE-2017-11600 page", "url": "https://www.suse.com/security/cve/CVE-2017-11600/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18344 page", "url": "https://www.suse.com/security/cve/CVE-2017-18344/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-08-16T16:00:10Z", "generator": { "date": "2018-08-16T16:00:10Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2387-1", "initial_release_date": "2018-08-16T16:00:10Z", "revision_history": [ { "date": "2018-08-16T16:00:10Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_74-92_38-default-11-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_74-92_38-default-11-2.1.x86_64", "product_id": "kgraft-patch-4_4_74-92_38-default-11-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_38-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_38-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_38-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_38-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-11600", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-11600" } ], "notes": [ { "category": "general", "text": "net/xfrm/xfrm_policy.c in the Linux kernel through 4.12.3, when CONFIG_XFRM_MIGRATE is enabled, does not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allows local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-11600", "url": "https://www.suse.com/security/cve/CVE-2017-11600" }, { "category": "external", "summary": "SUSE Bug 1050231 for CVE-2017-11600", "url": "https://bugzilla.suse.com/1050231" }, { "category": "external", "summary": "SUSE Bug 1096564 for CVE-2017-11600", "url": "https://bugzilla.suse.com/1096564" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-11600", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T16:00:10Z", "details": "important" } ], "title": "CVE-2017-11600" }, { "cve": "CVE-2017-18344", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18344" } ], "notes": [ { "category": "general", "text": "The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18344", "url": "https://www.suse.com/security/cve/CVE-2017-18344" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102851 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1102851" }, { "category": "external", "summary": "SUSE Bug 1103203 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103203" }, { "category": "external", "summary": "SUSE Bug 1103580 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103580" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T16:00:10Z", "details": "moderate" } ], "title": "CVE-2017-18344" }, { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T16:00:10Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T16:00:10Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2472-1
Vulnerability from csaf_suse
Published
2018-08-21 15:13
Modified
2018-08-21 15:13
Summary
Security update for the Linux Kernel (Live Patch 1 for SLE 15)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 1 for SLE 15)
Description of the patch
This update for the Linux Kernel 4.12.14-25_3 fixes several issues.
The following security issues were fixed:
- CVE-2018-5390: Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102682).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn't properly validate the sigevent->sigev_notify field, which lead to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bsc#1103203).
before 4.14.8
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
Patchnames
SUSE-SLE-Module-Live-Patching-15-2018-1737
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 1 for SLE 15)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-25_3 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-5390: Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102682).\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).\n- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn\u0027t properly validate the sigevent-\u003esigev_notify field, which lead to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bsc#1103203).\nbefore 4.14.8\n- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn\u0027t propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Live-Patching-15-2018-1737", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2472-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2472-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182472-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2472-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004485.html" }, { "category": "self", "summary": "SUSE Bug 1097108", "url": "https://bugzilla.suse.com/1097108" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE Bug 1102682", "url": "https://bugzilla.suse.com/1102682" }, { "category": "self", "summary": "SUSE Bug 1103203", "url": "https://bugzilla.suse.com/1103203" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18344 page", "url": "https://www.suse.com/security/cve/CVE-2017-18344/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" } ], "title": "Security update for the Linux Kernel (Live Patch 1 for SLE 15)", "tracking": { "current_release_date": "2018-08-21T15:13:14Z", "generator": { "date": "2018-08-21T15:13:14Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2472-1", "initial_release_date": "2018-08-21T15:13:14Z", "revision_history": [ { "date": "2018-08-21T15:13:14Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64", "product_id": "kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-18344", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18344" } ], "notes": [ { "category": "general", "text": "The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18344", "url": "https://www.suse.com/security/cve/CVE-2017-18344" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102851 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1102851" }, { "category": "external", "summary": "SUSE Bug 1103203 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103203" }, { "category": "external", "summary": "SUSE Bug 1103580 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103580" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-21T15:13:14Z", "details": "moderate" } ], "title": "CVE-2017-18344" }, { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-21T15:13:14Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-21T15:13:14Z", "details": "important" } ], "title": "CVE-2018-3646" }, { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-21T15:13:14Z", "details": "moderate" } ], "title": "CVE-2018-5390" } ] }
suse-su-2018:2348-1
Vulnerability from csaf_suse
Published
2018-08-16 06:06
Modified
2018-08-16 06:06
Summary
Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP1)
Description of the patch
This update for the Linux Kernel 3.12.74-60_64_88 fixes several issues.
The following security issues were fixed:
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
Patchnames
SUSE-SLE-SAP-12-SP1-2018-1594,SUSE-SLE-SERVER-12-SP1-2018-1594
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_88 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).\n- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn\u0027t propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-1594,SUSE-SLE-SERVER-12-SP1-2018-1594", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2348-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2348-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182348-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2348-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004431.html" }, { "category": "self", "summary": "SUSE Bug 1097108", "url": "https://bugzilla.suse.com/1097108" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-08-16T06:06:28Z", "generator": { "date": "2018-08-16T06:06:28Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2348-1", "initial_release_date": "2018-08-16T06:06:28Z", "revision_history": [ { "date": "2018-08-16T06:06:28Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_88-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_88-default-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_88-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_88-xen-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_88-xen-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_88-xen-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:06:28Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:06:28Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2356-1
Vulnerability from csaf_suse
Published
2018-08-16 06:05
Modified
2018-08-16 06:05
Summary
Security update for the Linux Kernel (Live Patch 30 for SLE 12)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 30 for SLE 12)
Description of the patch
This update for the Linux Kernel 3.12.61-52_111 fixes several issues.
The following security issues were fixed:
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
Patchnames
SUSE-SLE-SERVER-12-2018-1582
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 30 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_111 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).\n- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn\u0027t propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-1582", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2356-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2356-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182356-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2356-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004439.html" }, { "category": "self", "summary": "SUSE Bug 1097108", "url": "https://bugzilla.suse.com/1097108" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for the Linux Kernel (Live Patch 30 for SLE 12)", "tracking": { "current_release_date": "2018-08-16T06:05:29Z", "generator": { "date": "2018-08-16T06:05:29Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2356-1", "initial_release_date": "2018-08-16T06:05:29Z", "revision_history": [ { "date": "2018-08-16T06:05:29Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_111-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_111-default-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_111-default-7-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_111-xen-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_111-xen-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_111-xen-7-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:05:29Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:05:29Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2363-1
Vulnerability from csaf_suse
Published
2018-08-16 06:06
Modified
2018-08-16 06:06
Summary
Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP1)
Description of the patch
This update for the Linux Kernel 3.12.74-60_64_82 fixes several issues.
The following security issues were fixed:
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
Patchnames
SUSE-SLE-SAP-12-SP1-2018-1596,SUSE-SLE-SERVER-12-SP1-2018-1596
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_82 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).\n- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn\u0027t propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-1596,SUSE-SLE-SERVER-12-SP1-2018-1596", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2363-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2363-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182363-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2363-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004443.html" }, { "category": "self", "summary": "SUSE Bug 1097108", "url": "https://bugzilla.suse.com/1097108" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-08-16T06:06:39Z", "generator": { "date": "2018-08-16T06:06:39Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2363-1", "initial_release_date": "2018-08-16T06:06:39Z", "revision_history": [ { "date": "2018-08-16T06:06:39Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_82-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_82-default-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_82-default-6-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_82-xen-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_82-xen-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_82-xen-6-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:06:39Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:06:39Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2352-1
Vulnerability from csaf_suse
Published
2018-08-16 06:05
Modified
2018-08-16 06:05
Summary
Security update for the Linux Kernel (Live Patch 26 for SLE 12)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 26 for SLE 12)
Description of the patch
This update for the Linux Kernel 3.12.61-52_89 fixes several issues.
The following security issues were fixed:
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2017-11600: net/xfrm/xfrm_policy.c did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bsc#1096564)
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
Patchnames
SUSE-SLE-SERVER-12-2018-1588
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 26 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_89 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).\n- CVE-2017-11600: net/xfrm/xfrm_policy.c did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bsc#1096564) \n- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn\u0027t propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-1588", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2352-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2352-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182352-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2352-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004435.html" }, { "category": "self", "summary": "SUSE Bug 1096564", "url": "https://bugzilla.suse.com/1096564" }, { "category": "self", "summary": "SUSE Bug 1097108", "url": "https://bugzilla.suse.com/1097108" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE CVE CVE-2017-11600 page", "url": "https://www.suse.com/security/cve/CVE-2017-11600/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for the Linux Kernel (Live Patch 26 for SLE 12)", "tracking": { "current_release_date": "2018-08-16T06:05:57Z", "generator": { "date": "2018-08-16T06:05:57Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2352-1", "initial_release_date": "2018-08-16T06:05:57Z", "revision_history": [ { "date": "2018-08-16T06:05:57Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_89-default-11-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_89-default-11-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_89-default-11-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_89-xen-11-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_89-xen-11-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_89-xen-11-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_89-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_89-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_89-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_89-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-11600", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-11600" } ], "notes": [ { "category": "general", "text": "net/xfrm/xfrm_policy.c in the Linux kernel through 4.12.3, when CONFIG_XFRM_MIGRATE is enabled, does not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allows local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-11600", "url": "https://www.suse.com/security/cve/CVE-2017-11600" }, { "category": "external", "summary": "SUSE Bug 1050231 for CVE-2017-11600", "url": "https://bugzilla.suse.com/1050231" }, { "category": "external", "summary": "SUSE Bug 1096564 for CVE-2017-11600", "url": "https://bugzilla.suse.com/1096564" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-11600", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:05:57Z", "details": "important" } ], "title": "CVE-2017-11600" }, { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:05:57Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:05:57Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2473-1
Vulnerability from csaf_suse
Published
2018-08-21 15:13
Modified
2018-08-21 15:13
Summary
Security update for the Linux Kernel (Live Patch 2 for SLE 15)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 2 for SLE 15)
Description of the patch
This update for the Linux Kernel 4.12.14-25_6 fixes one issue.
The following security issue was fixed:
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
Patchnames
SUSE-SLE-Module-Live-Patching-15-2018-1738
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 2 for SLE 15)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-25_6 fixes one issue.\n\nThe following security issue was fixed:\n\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Live-Patching-15-2018-1738", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2473-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2473-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182473-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2473-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004486.html" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for the Linux Kernel (Live Patch 2 for SLE 15)", "tracking": { "current_release_date": "2018-08-21T15:13:21Z", "generator": { "date": "2018-08-21T15:13:21Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2473-1", "initial_release_date": "2018-08-21T15:13:21Z", "revision_history": [ { "date": "2018-08-21T15:13:21Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-4_12_14-25_6-default-2-2.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-25_6-default-2-2.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-25_6-default-2-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-4_12_14-25_6-default-2-2.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-25_6-default-2-2.1.x86_64", "product_id": "kernel-livepatch-4_12_14-25_6-default-2-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-25_6-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-2-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-25_6-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-25_6-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-2-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-25_6-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-21T15:13:21Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2528-1
Vulnerability from csaf_suse
Published
2018-08-27 10:02
Modified
2018-08-27 10:02
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
These security issue were fixed:
- CVE-2018-3646: Systems with microprocessors utilizing speculative execution
and address translations may have allowed unauthorized disclosure of
information residing in the L1 data cache to an attacker with local user access
with guest OS privilege via a terminal page fault and a side-channel analysis
(bsc#1091107, bsc#1027519).
- CVE-2018-12617: An integer overflow that could cause a segmentation
fault in qmp_guest_file_read() with g_malloc() in qemu-guest-agent was
fixed (bsc#1098744)
- CVE-2018-3665: System software utilizing Lazy FP state restore technique
on systems using Intel Core-based microprocessors may potentially allow
a local process to infer data from another process through a speculative
execution side channel. (bsc#1095242)
- CVE-2018-3639: Systems with microprocessors utilizing speculative
execution and speculative execution of memory reads before the addresses
of all prior memory writes are known may allow unauthorized disclosure
of information to an attacker with local user access via a side-channel
analysis, aka Speculative Store Bypass (SSB), Variant 4. (bsc#1092631)
- CVE-2017-5715: Systems with microprocessors utilizing speculative
execution and indirect branch prediction may allow unauthorized disclosure
of information to an attacker with local user access via a side-channel
analysis. (bsc#1074562)
- CVE-2017-5753: Systems with microprocessors utilizing speculative
execution and branch prediction may allow unauthorized disclosure of
information to an attacker with local user access via a side-channel
analysis. (bsc#1074562)
- CVE-2017-5754: Systems with microprocessors utilizing speculative
execution and indirect branch prediction may allow unauthorized disclosure
of information to an attacker with local user access via a side-channel
analysis of the data cache. (bsc#1074562)
- CVE-2018-12891: Certain PV MMU operations may take a long time to
process. For that reason Xen explicitly checks for the need to preempt
the current vCPU at certain points. A few rarely taken code paths did
bypass such checks. By suitably enforcing the conditions through its own
page table contents, a malicious guest may cause such bypasses to be used
for an unbounded number of iterations. A malicious or buggy PV guest may
cause a Denial of Service (DoS) affecting the entire host. Specifically,
it may prevent use of a physical CPU for an indeterminate period of
time. (bsc#1097521)
- CVE-2018-12893: One of the fixes in XSA-260 added some safety checks
to help prevent Xen livelocking with debug exceptions. Unfortunately,
due to an oversight, at least one of these safety checks can be
triggered by a guest. A malicious PV guest can crash Xen, leading to
a Denial of Service. Only x86 PV guests can exploit the vulnerability. x86
HVM and PVH guests cannot exploit the vulnerability. An attacker
needs to be able to control hardware debugging facilities to exploit
the vulnerability, but such permissions are typically available to
unprivileged users. (bsc#1097522)
- CVE-2018-11806: m_cat in slirp/mbuf.c in Qemu has a heap-based buffer
overflow via incoming fragmented datagrams. (bsc#1096224)
- CVE-2018-10982: An issue was discovered in Xen allowed x86 HVM guest
OS users to cause a denial of service (unexpectedly high interrupt
number, array overrun, and hypervisor crash) or possibly gain hypervisor
privileges by setting up an HPET timer to deliver interrupts in IO-APIC
mode, aka vHPET interrupt injection. (bsc#1090822)
- CVE-2018-10981: An issue was discovered in Xen that allowed x86 HVM guest OS users to cause a denial of service (host OS infinite loop) in situations where a QEMU device model attempts to make invalid transitions between states of a request. (bsc#1090823)
Following bugs were fixed:
- After updating to kernel 3.0.101-0.47.106.32-xen system crashes in check_bugs() (bsc#1097206)
- bsc#1079730 - in xen-kmp, unplug emulated devices after migration
This is required since xen-4.10 and/or qemu-2.10 because the state
of unplug is not propagated from one dom0 to another. Without
this unplug qemu's block-backend will be unable to open qcow2
disks on the receiving dom0
Patchnames
sleposp3-xen-13752,slessp3-xen-13752
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update for xen fixes the following issues:\n\nThese security issue were fixed:\n\n- CVE-2018-3646: Systems with microprocessors utilizing speculative execution\n and address translations may have allowed unauthorized disclosure of\n information residing in the L1 data cache to an attacker with local user access\n with guest OS privilege via a terminal page fault and a side-channel analysis\n (bsc#1091107, bsc#1027519).\n- CVE-2018-12617: An integer overflow that could cause a segmentation\n fault in qmp_guest_file_read() with g_malloc() in qemu-guest-agent was\n fixed (bsc#1098744)\n- CVE-2018-3665: System software utilizing Lazy FP state restore technique\n on systems using Intel Core-based microprocessors may potentially allow\n a local process to infer data from another process through a speculative\n execution side channel. (bsc#1095242)\n- CVE-2018-3639: Systems with microprocessors utilizing speculative\n execution and speculative execution of memory reads before the addresses\n of all prior memory writes are known may allow unauthorized disclosure\n of information to an attacker with local user access via a side-channel\n analysis, aka Speculative Store Bypass (SSB), Variant 4. (bsc#1092631)\n- CVE-2017-5715: Systems with microprocessors utilizing speculative\n execution and indirect branch prediction may allow unauthorized disclosure\n of information to an attacker with local user access via a side-channel\n analysis. (bsc#1074562)\n- CVE-2017-5753: Systems with microprocessors utilizing speculative\n execution and branch prediction may allow unauthorized disclosure of\n information to an attacker with local user access via a side-channel\n analysis. (bsc#1074562)\n- CVE-2017-5754: Systems with microprocessors utilizing speculative\n execution and indirect branch prediction may allow unauthorized disclosure\n of information to an attacker with local user access via a side-channel\n analysis of the data cache. (bsc#1074562)\n- CVE-2018-12891: Certain PV MMU operations may take a long time to\n process. For that reason Xen explicitly checks for the need to preempt\n the current vCPU at certain points. A few rarely taken code paths did\n bypass such checks. By suitably enforcing the conditions through its own\n page table contents, a malicious guest may cause such bypasses to be used\n for an unbounded number of iterations. A malicious or buggy PV guest may\n cause a Denial of Service (DoS) affecting the entire host. Specifically,\n it may prevent use of a physical CPU for an indeterminate period of\n time. (bsc#1097521)\n- CVE-2018-12893: One of the fixes in XSA-260 added some safety checks\n to help prevent Xen livelocking with debug exceptions. Unfortunately,\n due to an oversight, at least one of these safety checks can be\n triggered by a guest. A malicious PV guest can crash Xen, leading to\n a Denial of Service. Only x86 PV guests can exploit the vulnerability. x86\n HVM and PVH guests cannot exploit the vulnerability. An attacker\n needs to be able to control hardware debugging facilities to exploit\n the vulnerability, but such permissions are typically available to\n unprivileged users. (bsc#1097522)\n- CVE-2018-11806: m_cat in slirp/mbuf.c in Qemu has a heap-based buffer\n overflow via incoming fragmented datagrams. (bsc#1096224)\n- CVE-2018-10982: An issue was discovered in Xen allowed x86 HVM guest\n OS users to cause a denial of service (unexpectedly high interrupt\n number, array overrun, and hypervisor crash) or possibly gain hypervisor\n privileges by setting up an HPET timer to deliver interrupts in IO-APIC\n mode, aka vHPET interrupt injection. (bsc#1090822)\n- CVE-2018-10981: An issue was discovered in Xen that allowed x86 HVM guest OS users to cause a denial of service (host OS infinite loop) in situations where a QEMU device model attempts to make invalid transitions between states of a request. (bsc#1090823)\n\nFollowing bugs were fixed:\n\n- After updating to kernel 3.0.101-0.47.106.32-xen system crashes in check_bugs() (bsc#1097206)\n- bsc#1079730 - in xen-kmp, unplug emulated devices after migration\n This is required since xen-4.10 and/or qemu-2.10 because the state\n of unplug is not propagated from one dom0 to another. Without\n this unplug qemu\u0027s block-backend will be unable to open qcow2\n disks on the receiving dom0\n ", "title": "Description of the patch" }, { "category": "details", "text": "sleposp3-xen-13752,slessp3-xen-13752", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2528-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2528-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182528-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2528-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1074562", "url": "https://bugzilla.suse.com/1074562" }, { "category": "self", "summary": "SUSE Bug 1079730", "url": "https://bugzilla.suse.com/1079730" }, { "category": "self", "summary": "SUSE Bug 1090822", "url": "https://bugzilla.suse.com/1090822" }, { "category": "self", "summary": "SUSE Bug 1090823", "url": "https://bugzilla.suse.com/1090823" }, { "category": "self", "summary": "SUSE Bug 1091107", "url": "https://bugzilla.suse.com/1091107" }, { "category": "self", "summary": "SUSE Bug 1092631", "url": "https://bugzilla.suse.com/1092631" }, { "category": "self", "summary": "SUSE Bug 1095242", "url": "https://bugzilla.suse.com/1095242" }, { "category": "self", "summary": "SUSE Bug 1096224", "url": "https://bugzilla.suse.com/1096224" }, { "category": "self", "summary": "SUSE Bug 1097206", "url": "https://bugzilla.suse.com/1097206" }, { "category": "self", "summary": "SUSE Bug 1097521", "url": "https://bugzilla.suse.com/1097521" }, { "category": "self", "summary": "SUSE Bug 1097522", "url": "https://bugzilla.suse.com/1097522" }, { "category": "self", "summary": "SUSE Bug 1098744", "url": "https://bugzilla.suse.com/1098744" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5715 page", "url": "https://www.suse.com/security/cve/CVE-2017-5715/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5753 page", "url": "https://www.suse.com/security/cve/CVE-2017-5753/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5754 page", "url": "https://www.suse.com/security/cve/CVE-2017-5754/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10981 page", "url": "https://www.suse.com/security/cve/CVE-2018-10981/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10982 page", "url": "https://www.suse.com/security/cve/CVE-2018-10982/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-11806 page", "url": "https://www.suse.com/security/cve/CVE-2018-11806/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12617 page", "url": "https://www.suse.com/security/cve/CVE-2018-12617/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12891 page", "url": "https://www.suse.com/security/cve/CVE-2018-12891/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12893 page", "url": "https://www.suse.com/security/cve/CVE-2018-12893/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3639 page", "url": "https://www.suse.com/security/cve/CVE-2018-3639/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3665 page", "url": "https://www.suse.com/security/cve/CVE-2018-3665/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2018-08-27T10:02:13Z", "generator": { "date": "2018-08-27T10:02:13Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2528-1", "initial_release_date": "2018-08-27T10:02:13Z", "revision_history": [ { "date": "2018-08-27T10:02:13Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "product": { "name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "product_id": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586" } }, { "category": "product_version", "name": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "product": { "name": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "product_id": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.2.5_21-45.25.1.i586", "product": { "name": "xen-libs-4.2.5_21-45.25.1.i586", "product_id": "xen-libs-4.2.5_21-45.25.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.2.5_21-45.25.1.i586", "product": { "name": "xen-tools-domU-4.2.5_21-45.25.1.i586", "product_id": "xen-tools-domU-4.2.5_21-45.25.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-4.2.5_21-45.25.1.x86_64", "product": { "name": "xen-4.2.5_21-45.25.1.x86_64", "product_id": "xen-4.2.5_21-45.25.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.2.5_21-45.25.1.x86_64", "product": { "name": "xen-doc-html-4.2.5_21-45.25.1.x86_64", "product_id": "xen-doc-html-4.2.5_21-45.25.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "product": { "name": "xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "product_id": "xen-doc-pdf-4.2.5_21-45.25.1.x86_64" } }, { "category": "product_version", "name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "product": { "name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "product_id": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.2.5_21-45.25.1.x86_64", "product": { "name": "xen-libs-4.2.5_21-45.25.1.x86_64", "product_id": "xen-libs-4.2.5_21-45.25.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "product": { "name": "xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "product_id": "xen-libs-32bit-4.2.5_21-45.25.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.2.5_21-45.25.1.x86_64", "product": { "name": "xen-tools-4.2.5_21-45.25.1.x86_64", "product_id": "xen-tools-4.2.5_21-45.25.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.2.5_21-45.25.1.x86_64", "product": { "name": "xen-tools-domU-4.2.5_21-45.25.1.x86_64", "product_id": "xen-tools-domU-4.2.5_21-45.25.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product": { "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-pos:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586" }, "product_reference": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586" }, "product_reference": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_21-45.25.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586" }, "product_reference": "xen-libs-4.2.5_21-45.25.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_21-45.25.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586" }, "product_reference": "xen-tools-domU-4.2.5_21-45.25.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.2.5_21-45.25.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64" }, "product_reference": "xen-4.2.5_21-45.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.2.5_21-45.25.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64" }, "product_reference": "xen-doc-html-4.2.5_21-45.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-pdf-4.2.5_21-45.25.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64" }, "product_reference": "xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586" }, "product_reference": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64" }, "product_reference": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586" }, "product_reference": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_21-45.25.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586" }, "product_reference": "xen-libs-4.2.5_21-45.25.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_21-45.25.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64" }, "product_reference": "xen-libs-4.2.5_21-45.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.2.5_21-45.25.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64" }, "product_reference": "xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.2.5_21-45.25.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64" }, "product_reference": "xen-tools-4.2.5_21-45.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_21-45.25.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586" }, "product_reference": "xen-tools-domU-4.2.5_21-45.25.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_21-45.25.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" }, "product_reference": "xen-tools-domU-4.2.5_21-45.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-5715", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5715" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5715", "url": "https://www.suse.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1074741 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074741" }, { "category": "external", "summary": "SUSE Bug 1074919 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074919" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075007 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075007" }, { "category": "external", "summary": "SUSE Bug 1075262 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075262" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1076115 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076115" }, { "category": "external", "summary": "SUSE Bug 1076372 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076372" }, { "category": "external", "summary": "SUSE Bug 1076606 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076606" }, { "category": "external", "summary": "SUSE Bug 1078353 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1078353" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087887 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087887" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1088147 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1088147" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1095735 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1095735" }, { "category": "external", "summary": "SUSE Bug 1102517 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1102517" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1105108" }, { "category": "external", "summary": "SUSE Bug 1126516 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1126516" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201457 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201457" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1203236 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1203236" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-27T10:02:13Z", "details": "important" } ], "title": "CVE-2017-5715" }, { "cve": "CVE-2017-5753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5753" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5753", "url": "https://www.suse.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1075748 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075748" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087084 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087084" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1209547 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1209547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-27T10:02:13Z", "details": "important" } ], "title": "CVE-2017-5753" }, { "cve": "CVE-2017-5754", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5754" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5754", "url": "https://www.suse.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075008 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1075008" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1115045 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1115045" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-27T10:02:13Z", "details": "moderate" } ], "title": "CVE-2017-5754" }, { "cve": "CVE-2018-10981", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10981" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (host OS infinite loop) in situations where a QEMU device model attempts to make invalid transitions between states of a request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10981", "url": "https://www.suse.com/security/cve/CVE-2018-10981" }, { "category": "external", "summary": "SUSE Bug 1090823 for CVE-2018-10981", "url": "https://bugzilla.suse.com/1090823" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-10981", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-27T10:02:13Z", "details": "moderate" } ], "title": "CVE-2018-10981" }, { "cve": "CVE-2018-10982", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10982" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (unexpectedly high interrupt number, array overrun, and hypervisor crash) or possibly gain hypervisor privileges by setting up an HPET timer to deliver interrupts in IO-APIC mode, aka vHPET interrupt injection.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10982", "url": "https://www.suse.com/security/cve/CVE-2018-10982" }, { "category": "external", "summary": "SUSE Bug 1090822 for CVE-2018-10982", "url": "https://bugzilla.suse.com/1090822" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-10982", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-27T10:02:13Z", "details": "important" } ], "title": "CVE-2018-10982" }, { "cve": "CVE-2018-11806", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-11806" } ], "notes": [ { "category": "general", "text": "m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-11806", "url": "https://www.suse.com/security/cve/CVE-2018-11806" }, { "category": "external", "summary": "SUSE Bug 1096223 for CVE-2018-11806", "url": "https://bugzilla.suse.com/1096223" }, { "category": "external", "summary": "SUSE Bug 1096224 for CVE-2018-11806", "url": "https://bugzilla.suse.com/1096224" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-11806", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-27T10:02:13Z", "details": "moderate" } ], "title": "CVE-2018-11806" }, { "cve": "CVE-2018-12617", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12617" } ], "notes": [ { "category": "general", "text": "qmp_guest_file_read in qga/commands-posix.c and qga/commands-win32.c in qemu-ga (aka QEMU Guest Agent) in QEMU 2.12.50 has an integer overflow causing a g_malloc0() call to trigger a segmentation fault when trying to allocate a large memory chunk. The vulnerability can be exploited by sending a crafted QMP command (including guest-file-read with a large count value) to the agent via the listening socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12617", "url": "https://www.suse.com/security/cve/CVE-2018-12617" }, { "category": "external", "summary": "SUSE Bug 1098735 for CVE-2018-12617", "url": "https://bugzilla.suse.com/1098735" }, { "category": "external", "summary": "SUSE Bug 1098744 for CVE-2018-12617", "url": "https://bugzilla.suse.com/1098744" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-27T10:02:13Z", "details": "moderate" } ], "title": "CVE-2018-12617" }, { "cve": "CVE-2018-12891", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12891" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x. Certain PV MMU operations may take a long time to process. For that reason Xen explicitly checks for the need to preempt the current vCPU at certain points. A few rarely taken code paths did bypass such checks. By suitably enforcing the conditions through its own page table contents, a malicious guest may cause such bypasses to be used for an unbounded number of iterations. A malicious or buggy PV guest may cause a Denial of Service (DoS) affecting the entire host. Specifically, it may prevent use of a physical CPU for an indeterminate period of time. All Xen versions from 3.4 onwards are vulnerable. Xen versions 3.3 and earlier are vulnerable to an even wider class of attacks, due to them lacking preemption checks altogether in the affected code paths. Only x86 systems are affected. ARM systems are not affected. Only multi-vCPU x86 PV guests can leverage the vulnerability. x86 HVM or PVH guests as well as x86 single-vCPU PV ones cannot leverage the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12891", "url": "https://www.suse.com/security/cve/CVE-2018-12891" }, { "category": "external", "summary": "SUSE Bug 1097521 for CVE-2018-12891", "url": "https://bugzilla.suse.com/1097521" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12891", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-27T10:02:13Z", "details": "important" } ], "title": "CVE-2018-12891" }, { "cve": "CVE-2018-12893", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12893" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x. One of the fixes in XSA-260 added some safety checks to help prevent Xen livelocking with debug exceptions. Unfortunately, due to an oversight, at least one of these safety checks can be triggered by a guest. A malicious PV guest can crash Xen, leading to a Denial of Service. All Xen systems which have applied the XSA-260 fix are vulnerable. Only x86 systems are vulnerable. ARM systems are not vulnerable. Only x86 PV guests can exploit the vulnerability. x86 HVM and PVH guests cannot exploit the vulnerability. An attacker needs to be able to control hardware debugging facilities to exploit the vulnerability, but such permissions are typically available to unprivileged users.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12893", "url": "https://www.suse.com/security/cve/CVE-2018-12893" }, { "category": "external", "summary": "SUSE Bug 1097522 for CVE-2018-12893", "url": "https://bugzilla.suse.com/1097522" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12893", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-27T10:02:13Z", "details": "important" } ], "title": "CVE-2018-12893" }, { "cve": "CVE-2018-3639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3639" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3639", "url": "https://www.suse.com/security/cve/CVE-2018-3639" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1085235 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085235" }, { "category": "external", "summary": "SUSE Bug 1085308 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085308" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092631 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092631" }, { "category": "external", "summary": "SUSE Bug 1092885 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092885" }, { "category": "external", "summary": "SUSE Bug 1094912 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1094912" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100394 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1100394" }, { "category": "external", "summary": "SUSE Bug 1102640 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1102640" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1105412" }, { "category": "external", "summary": "SUSE Bug 1111963 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1111963" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172781" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172782" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172783" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-27T10:02:13Z", "details": "moderate" } ], "title": "CVE-2018-3639" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-27T10:02:13Z", "details": "important" } ], "title": "CVE-2018-3646" }, { "cve": "CVE-2018-3665", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3665" } ], "notes": [ { "category": "general", "text": "System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3665", "url": "https://www.suse.com/security/cve/CVE-2018-3665" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1087086 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1087086" }, { "category": "external", "summary": "SUSE Bug 1090338 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1090338" }, { "category": "external", "summary": "SUSE Bug 1095241 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1095241" }, { "category": "external", "summary": "SUSE Bug 1095242 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1095242" }, { "category": "external", "summary": "SUSE Bug 1096740 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1096740" }, { "category": "external", "summary": "SUSE Bug 1100091 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1100091" }, { "category": "external", "summary": "SUSE Bug 1100555 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1100555" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-27T10:02:13Z", "details": "moderate" } ], "title": "CVE-2018-3665" } ] }
suse-su-2018:2350-1
Vulnerability from csaf_suse
Published
2018-08-16 06:06
Modified
2018-08-16 06:06
Summary
Security update for the Linux Kernel (Live Patch 21 for SLE 12 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 21 for SLE 12 SP1)
Description of the patch
This update for the Linux Kernel 3.12.74-60_64_60 fixes several issues.
The following security issues were fixed:
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2017-11600: net/xfrm/xfrm_policy.c did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bsc#1096564)
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
Patchnames
SUSE-SLE-SAP-12-SP1-2018-1600,SUSE-SLE-SERVER-12-SP1-2018-1600
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 21 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_60 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).\n- CVE-2017-11600: net/xfrm/xfrm_policy.c did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bsc#1096564) \n- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn\u0027t propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-1600,SUSE-SLE-SERVER-12-SP1-2018-1600", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2350-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2350-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182350-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2350-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004433.html" }, { "category": "self", "summary": "SUSE Bug 1096564", "url": "https://bugzilla.suse.com/1096564" }, { "category": "self", "summary": "SUSE Bug 1097108", "url": "https://bugzilla.suse.com/1097108" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE CVE CVE-2017-11600 page", "url": "https://www.suse.com/security/cve/CVE-2017-11600/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for the Linux Kernel (Live Patch 21 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-08-16T06:06:59Z", "generator": { "date": "2018-08-16T06:06:59Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2350-1", "initial_release_date": "2018-08-16T06:06:59Z", "revision_history": [ { "date": "2018-08-16T06:06:59Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_60-default-10-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_60-default-10-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_60-default-10-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_60-xen-10-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_60-xen-10-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_60-xen-10-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-11600", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-11600" } ], "notes": [ { "category": "general", "text": "net/xfrm/xfrm_policy.c in the Linux kernel through 4.12.3, when CONFIG_XFRM_MIGRATE is enabled, does not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allows local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-11600", "url": "https://www.suse.com/security/cve/CVE-2017-11600" }, { "category": "external", "summary": "SUSE Bug 1050231 for CVE-2017-11600", "url": "https://bugzilla.suse.com/1050231" }, { "category": "external", "summary": "SUSE Bug 1096564 for CVE-2017-11600", "url": "https://bugzilla.suse.com/1096564" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-11600", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:06:59Z", "details": "important" } ], "title": "CVE-2017-11600" }, { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:06:59Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:06:59Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2369-1
Vulnerability from csaf_suse
Published
2018-08-16 06:05
Modified
2018-08-16 06:05
Summary
Security update for the Linux Kernel (Live Patch 36 for SLE 12)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 36 for SLE 12)
Description of the patch
This update for the Linux Kernel 3.12.61-52_136 fixes several issues.
The following security issues were fixed:
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
Patchnames
SUSE-SLE-SERVER-12-2018-1587
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 36 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_136 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).\n- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn\u0027t propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-1587", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2369-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2369-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182369-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2369-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004448.html" }, { "category": "self", "summary": "SUSE Bug 1097108", "url": "https://bugzilla.suse.com/1097108" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for the Linux Kernel (Live Patch 36 for SLE 12)", "tracking": { "current_release_date": "2018-08-16T06:05:53Z", "generator": { "date": "2018-08-16T06:05:53Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2369-1", "initial_release_date": "2018-08-16T06:05:53Z", "revision_history": [ { "date": "2018-08-16T06:05:53Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_136-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_136-default-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_136-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_136-xen-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_136-xen-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_136-xen-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:05:53Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:05:53Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2367-1
Vulnerability from csaf_suse
Published
2018-08-16 06:06
Modified
2018-08-16 06:06
Summary
Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP1)
Description of the patch
This update for the Linux Kernel 3.12.74-60_64_66 fixes several issues.
The following security issues were fixed:
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2017-11600: net/xfrm/xfrm_policy.c did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bsc#1096564)
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
Patchnames
SUSE-SLE-SAP-12-SP1-2018-1598,SUSE-SLE-SERVER-12-SP1-2018-1598
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_66 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).\n- CVE-2017-11600: net/xfrm/xfrm_policy.c did not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allowed local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message (bsc#1096564) \n- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn\u0027t propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-1598,SUSE-SLE-SERVER-12-SP1-2018-1598", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2367-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2367-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182367-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2367-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004446.html" }, { "category": "self", "summary": "SUSE Bug 1096564", "url": "https://bugzilla.suse.com/1096564" }, { "category": "self", "summary": "SUSE Bug 1097108", "url": "https://bugzilla.suse.com/1097108" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE CVE CVE-2017-11600 page", "url": "https://www.suse.com/security/cve/CVE-2017-11600/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-08-16T06:06:49Z", "generator": { "date": "2018-08-16T06:06:49Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2367-1", "initial_release_date": "2018-08-16T06:06:49Z", "revision_history": [ { "date": "2018-08-16T06:06:49Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_66-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_66-default-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_66-default-7-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_66-xen-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_66-xen-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_66-xen-7-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-11600", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-11600" } ], "notes": [ { "category": "general", "text": "net/xfrm/xfrm_policy.c in the Linux kernel through 4.12.3, when CONFIG_XFRM_MIGRATE is enabled, does not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allows local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-11600", "url": "https://www.suse.com/security/cve/CVE-2017-11600" }, { "category": "external", "summary": "SUSE Bug 1050231 for CVE-2017-11600", "url": "https://bugzilla.suse.com/1050231" }, { "category": "external", "summary": "SUSE Bug 1096564 for CVE-2017-11600", "url": "https://bugzilla.suse.com/1096564" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-11600", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:06:49Z", "details": "important" } ], "title": "CVE-2017-11600" }, { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:06:49Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:06:49Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2332-1
Vulnerability from csaf_suse
Published
2018-08-15 11:17
Modified
2018-08-15 11:17
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).
- CVE-2018-1000204: A malformed SG_IO ioctl issued for a SCSI device could lead to a local kernel information leak manifesting in up to approximately 1000 memory pages copied to the userspace. The problem has limited scope as non-privileged users usually have no permissions to access SCSI device files. (bnc#1096728).
- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).
- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 bnc#1100418).
- CVE-2016-8405: An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. (bnc#1099942).
- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations could be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).
- CVE-2018-12233: In the ea_get function in fs/jfs/xattr.c a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. (bnc#1097234).
- CVE-2017-13305: A information disclosure vulnerability in the Upstream kernel encrypted-keys. (bnc#1094353).
- CVE-2018-1130: A null pointer dereference in dccp_write_xmit() function in net/dccp/output.c allowed a local user to cause a denial of service by a number of certain crafted system calls (bnc#1092904).
- CVE-2018-1068: A flaw was found in the implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bnc#1085107).
- CVE-2018-5803: An error in the '_sctp_make_chunk()' function (net/sctp/sm_make_chunk.c) when handling SCTP packets length could be exploited to cause a kernel crash (bnc#1083900).
- CVE-2018-7492: A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function allowed local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST (bnc#1082962).
The following non-security bugs were fixed:
- cpu/hotplug: Add sysfs state interface (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- disable-prot_none_mitigation.patch: disable prot_none native mitigation (bnc#1104684)
- fix pgd underflow (bnc#1104475) custom walk_page_range rework was incorrect and could underflow pgd if the given range was below a first vma.
- slab: introduce kmalloc_array() (bsc#909361).
- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).
- x86/cpu/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/topology: Add topology_max_smt_threads() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- xen/x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- xen/x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- xen/x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/mm: Simplify p[g4um]d_page() macros (bnc#1087081, bnc#1104684).
Patchnames
sdksp4-kernel-201808-13728,slessp4-kernel-201808-13728,slexsp3-kernel-201808-13728
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).\n- CVE-2018-1000204: A malformed SG_IO ioctl issued for a SCSI device could lead to a local kernel information leak manifesting in up to approximately 1000 memory pages copied to the userspace. The problem has limited scope as non-privileged users usually have no permissions to access SCSI device files. (bnc#1096728).\n- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).\n- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 bnc#1100418).\n- CVE-2016-8405: An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. (bnc#1099942).\n- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations could be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).\n- CVE-2018-12233: In the ea_get function in fs/jfs/xattr.c a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. (bnc#1097234).\n- CVE-2017-13305: A information disclosure vulnerability in the Upstream kernel encrypted-keys. (bnc#1094353).\n- CVE-2018-1130: A null pointer dereference in dccp_write_xmit() function in net/dccp/output.c allowed a local user to cause a denial of service by a number of certain crafted system calls (bnc#1092904).\n- CVE-2018-1068: A flaw was found in the implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bnc#1085107).\n- CVE-2018-5803: An error in the \u0027_sctp_make_chunk()\u0027 function (net/sctp/sm_make_chunk.c) when handling SCTP packets length could be exploited to cause a kernel crash (bnc#1083900).\n- CVE-2018-7492: A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function allowed local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST (bnc#1082962).\n\nThe following non-security bugs were fixed:\n\n- cpu/hotplug: Add sysfs state interface (bsc#1089343).\n- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).\n- cpu/hotplug: Split do_cpu_down() (bsc#1089343).\n- disable-prot_none_mitigation.patch: disable prot_none native mitigation (bnc#1104684)\n- fix pgd underflow (bnc#1104475) custom walk_page_range rework was incorrect and could underflow pgd if the given range was below a first vma.\n- slab: introduce kmalloc_array() (bsc#909361).\n- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).\n- x86/cpu/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).\n- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).\n- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).\n- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).\n- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).\n- x86/topology: Add topology_max_smt_threads() (bsc#1089343).\n- x86/topology: Provide topology_smt_supported() (bsc#1089343).\n- xen/x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- xen/x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- xen/x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- x86/mm: Simplify p[g4um]d_page() macros (bnc#1087081, bnc#1104684).\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp4-kernel-201808-13728,slessp4-kernel-201808-13728,slexsp3-kernel-201808-13728", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2332-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2332-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182332-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2332-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" }, { "category": "self", "summary": "SUSE Bug 1082962", "url": "https://bugzilla.suse.com/1082962" }, { "category": "self", "summary": "SUSE Bug 1083900", "url": "https://bugzilla.suse.com/1083900" }, { "category": "self", "summary": "SUSE Bug 1085107", "url": "https://bugzilla.suse.com/1085107" }, { "category": "self", "summary": "SUSE Bug 1087081", "url": "https://bugzilla.suse.com/1087081" }, { "category": "self", "summary": "SUSE Bug 1089343", "url": "https://bugzilla.suse.com/1089343" }, { "category": "self", "summary": "SUSE Bug 1092904", "url": "https://bugzilla.suse.com/1092904" }, { "category": "self", "summary": "SUSE Bug 1094353", "url": "https://bugzilla.suse.com/1094353" }, { "category": "self", "summary": "SUSE Bug 1096480", "url": "https://bugzilla.suse.com/1096480" }, { "category": "self", "summary": "SUSE Bug 1096728", "url": "https://bugzilla.suse.com/1096728" }, { "category": "self", "summary": "SUSE Bug 1097234", "url": "https://bugzilla.suse.com/1097234" }, { "category": "self", "summary": "SUSE Bug 1098016", "url": "https://bugzilla.suse.com/1098016" }, { "category": "self", "summary": "SUSE Bug 1099924", "url": "https://bugzilla.suse.com/1099924" }, { "category": "self", "summary": "SUSE Bug 1099942", "url": "https://bugzilla.suse.com/1099942" }, { "category": "self", "summary": "SUSE Bug 1100418", "url": "https://bugzilla.suse.com/1100418" }, { "category": "self", "summary": "SUSE Bug 1104475", "url": "https://bugzilla.suse.com/1104475" }, { "category": "self", "summary": "SUSE Bug 1104684", "url": "https://bugzilla.suse.com/1104684" }, { "category": "self", "summary": "SUSE Bug 909361", "url": "https://bugzilla.suse.com/909361" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8405 page", "url": "https://www.suse.com/security/cve/CVE-2016-8405/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13305 page", "url": "https://www.suse.com/security/cve/CVE-2017-13305/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000204 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000204/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1130 page", "url": "https://www.suse.com/security/cve/CVE-2018-1130/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12233 page", "url": "https://www.suse.com/security/cve/CVE-2018-12233/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13053 page", "url": "https://www.suse.com/security/cve/CVE-2018-13053/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13406 page", "url": "https://www.suse.com/security/cve/CVE-2018-13406/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3620 page", "url": "https://www.suse.com/security/cve/CVE-2018-3620/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5803 page", "url": "https://www.suse.com/security/cve/CVE-2018-5803/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5814 page", "url": "https://www.suse.com/security/cve/CVE-2018-5814/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7492 page", "url": "https://www.suse.com/security/cve/CVE-2018-7492/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-08-15T11:17:33Z", "generator": { "date": "2018-08-15T11:17:33Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2332-1", "initial_release_date": "2018-08-15T11:17:33Z", "revision_history": [ { "date": "2018-08-15T11:17:33Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.68.1.i586", "product": { "name": "kernel-default-3.0.101-108.68.1.i586", "product_id": "kernel-default-3.0.101-108.68.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.68.1.i586", "product": { "name": "kernel-default-base-3.0.101-108.68.1.i586", "product_id": "kernel-default-base-3.0.101-108.68.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.68.1.i586", "product": { "name": "kernel-default-devel-3.0.101-108.68.1.i586", "product_id": "kernel-default-devel-3.0.101-108.68.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-108.68.1.i586", "product": { "name": "kernel-ec2-3.0.101-108.68.1.i586", "product_id": "kernel-ec2-3.0.101-108.68.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-108.68.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-108.68.1.i586", "product_id": "kernel-ec2-base-3.0.101-108.68.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-108.68.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-108.68.1.i586", "product_id": "kernel-ec2-devel-3.0.101-108.68.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-108.68.1.i586", "product": { "name": "kernel-pae-3.0.101-108.68.1.i586", "product_id": "kernel-pae-3.0.101-108.68.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-108.68.1.i586", "product": { "name": "kernel-pae-base-3.0.101-108.68.1.i586", "product_id": "kernel-pae-base-3.0.101-108.68.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-108.68.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-108.68.1.i586", "product_id": "kernel-pae-devel-3.0.101-108.68.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.68.1.i586", "product": { "name": "kernel-source-3.0.101-108.68.1.i586", "product_id": "kernel-source-3.0.101-108.68.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.68.1.i586", "product": { "name": "kernel-syms-3.0.101-108.68.1.i586", "product_id": "kernel-syms-3.0.101-108.68.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.68.1.i586", "product": { "name": "kernel-trace-3.0.101-108.68.1.i586", "product_id": "kernel-trace-3.0.101-108.68.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.68.1.i586", "product": { "name": "kernel-trace-base-3.0.101-108.68.1.i586", "product_id": "kernel-trace-base-3.0.101-108.68.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.68.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-108.68.1.i586", "product_id": "kernel-trace-devel-3.0.101-108.68.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-108.68.1.i586", "product": { "name": "kernel-xen-3.0.101-108.68.1.i586", "product_id": "kernel-xen-3.0.101-108.68.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-108.68.1.i586", "product": { "name": "kernel-xen-base-3.0.101-108.68.1.i586", "product_id": "kernel-xen-base-3.0.101-108.68.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-108.68.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-108.68.1.i586", "product_id": "kernel-xen-devel-3.0.101-108.68.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.68.1.ia64", "product": { "name": "kernel-default-3.0.101-108.68.1.ia64", "product_id": "kernel-default-3.0.101-108.68.1.ia64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.68.1.ia64", "product": { "name": "kernel-default-base-3.0.101-108.68.1.ia64", "product_id": "kernel-default-base-3.0.101-108.68.1.ia64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.68.1.ia64", "product": { "name": "kernel-default-devel-3.0.101-108.68.1.ia64", "product_id": "kernel-default-devel-3.0.101-108.68.1.ia64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.68.1.ia64", "product": { "name": "kernel-source-3.0.101-108.68.1.ia64", "product_id": "kernel-source-3.0.101-108.68.1.ia64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.68.1.ia64", "product": { "name": "kernel-syms-3.0.101-108.68.1.ia64", "product_id": "kernel-syms-3.0.101-108.68.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.68.1.ia64", "product": { "name": "kernel-trace-3.0.101-108.68.1.ia64", "product_id": "kernel-trace-3.0.101-108.68.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.68.1.ia64", "product": { "name": "kernel-trace-base-3.0.101-108.68.1.ia64", "product_id": "kernel-trace-base-3.0.101-108.68.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.68.1.ia64", "product": { "name": "kernel-trace-devel-3.0.101-108.68.1.ia64", "product_id": "kernel-trace-devel-3.0.101-108.68.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-docs-3.0.101-108.68.1.noarch", "product": { "name": "kernel-docs-3.0.101-108.68.1.noarch", "product_id": "kernel-docs-3.0.101-108.68.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-bigmem-3.0.101-108.68.1.ppc64", "product": { "name": "kernel-bigmem-3.0.101-108.68.1.ppc64", "product_id": "kernel-bigmem-3.0.101-108.68.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-base-3.0.101-108.68.1.ppc64", "product": { "name": "kernel-bigmem-base-3.0.101-108.68.1.ppc64", "product_id": "kernel-bigmem-base-3.0.101-108.68.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "product": { "name": "kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "product_id": "kernel-bigmem-devel-3.0.101-108.68.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-108.68.1.ppc64", "product": { "name": "kernel-default-3.0.101-108.68.1.ppc64", "product_id": "kernel-default-3.0.101-108.68.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.68.1.ppc64", "product": { "name": "kernel-default-base-3.0.101-108.68.1.ppc64", "product_id": "kernel-default-base-3.0.101-108.68.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.68.1.ppc64", "product": { "name": "kernel-default-devel-3.0.101-108.68.1.ppc64", "product_id": "kernel-default-devel-3.0.101-108.68.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-3.0.101-108.68.1.ppc64", "product": { "name": "kernel-ppc64-3.0.101-108.68.1.ppc64", "product_id": "kernel-ppc64-3.0.101-108.68.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-base-3.0.101-108.68.1.ppc64", "product": { "name": "kernel-ppc64-base-3.0.101-108.68.1.ppc64", "product_id": "kernel-ppc64-base-3.0.101-108.68.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "product": { "name": "kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "product_id": "kernel-ppc64-devel-3.0.101-108.68.1.ppc64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.68.1.ppc64", "product": { "name": "kernel-source-3.0.101-108.68.1.ppc64", "product_id": "kernel-source-3.0.101-108.68.1.ppc64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.68.1.ppc64", "product": { "name": "kernel-syms-3.0.101-108.68.1.ppc64", "product_id": "kernel-syms-3.0.101-108.68.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.68.1.ppc64", "product": { "name": "kernel-trace-3.0.101-108.68.1.ppc64", "product_id": "kernel-trace-3.0.101-108.68.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.68.1.ppc64", "product": { "name": "kernel-trace-base-3.0.101-108.68.1.ppc64", "product_id": "kernel-trace-base-3.0.101-108.68.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.68.1.ppc64", "product": { "name": "kernel-trace-devel-3.0.101-108.68.1.ppc64", "product_id": "kernel-trace-devel-3.0.101-108.68.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.68.1.s390x", "product": { "name": "kernel-default-3.0.101-108.68.1.s390x", "product_id": "kernel-default-3.0.101-108.68.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.68.1.s390x", "product": { "name": "kernel-default-base-3.0.101-108.68.1.s390x", "product_id": "kernel-default-base-3.0.101-108.68.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.68.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-108.68.1.s390x", "product_id": "kernel-default-devel-3.0.101-108.68.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-108.68.1.s390x", "product": { "name": "kernel-default-man-3.0.101-108.68.1.s390x", "product_id": "kernel-default-man-3.0.101-108.68.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.68.1.s390x", "product": { "name": "kernel-source-3.0.101-108.68.1.s390x", "product_id": "kernel-source-3.0.101-108.68.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.68.1.s390x", "product": { "name": "kernel-syms-3.0.101-108.68.1.s390x", "product_id": "kernel-syms-3.0.101-108.68.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.68.1.s390x", "product": { "name": "kernel-trace-3.0.101-108.68.1.s390x", "product_id": "kernel-trace-3.0.101-108.68.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.68.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-108.68.1.s390x", "product_id": "kernel-trace-base-3.0.101-108.68.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.68.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-108.68.1.s390x", "product_id": "kernel-trace-devel-3.0.101-108.68.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.68.1.x86_64", "product": { "name": "kernel-default-3.0.101-108.68.1.x86_64", "product_id": "kernel-default-3.0.101-108.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.68.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-108.68.1.x86_64", "product_id": "kernel-default-base-3.0.101-108.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.68.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-108.68.1.x86_64", "product_id": "kernel-default-devel-3.0.101-108.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-108.68.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-108.68.1.x86_64", "product_id": "kernel-ec2-3.0.101-108.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-108.68.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-108.68.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-108.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-108.68.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-108.68.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-108.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.68.1.x86_64", "product": { "name": "kernel-source-3.0.101-108.68.1.x86_64", "product_id": "kernel-source-3.0.101-108.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.68.1.x86_64", "product": { "name": "kernel-syms-3.0.101-108.68.1.x86_64", "product_id": "kernel-syms-3.0.101-108.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.68.1.x86_64", "product": { "name": "kernel-trace-3.0.101-108.68.1.x86_64", "product_id": "kernel-trace-3.0.101-108.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.68.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-108.68.1.x86_64", "product_id": "kernel-trace-base-3.0.101-108.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.68.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-108.68.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-108.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-108.68.1.x86_64", "product": { "name": "kernel-xen-3.0.101-108.68.1.x86_64", "product_id": "kernel-xen-3.0.101-108.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-108.68.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-108.68.1.x86_64", "product_id": "kernel-xen-base-3.0.101-108.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-108.68.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-108.68.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-108.68.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.0.101-108.68.1.noarch as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" }, "product_reference": "kernel-docs-3.0.101-108.68.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-bigmem-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-base-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-bigmem-base-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-devel-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586" }, "product_reference": "kernel-default-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.68.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64" }, "product_reference": "kernel-default-3.0.101-108.68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-default-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-default-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-default-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586" }, "product_reference": "kernel-default-base-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.68.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-108.68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.68.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-108.68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586" }, "product_reference": "kernel-ec2-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586" }, "product_reference": "kernel-pae-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586" }, "product_reference": "kernel-source-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.68.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64" }, "product_reference": "kernel-source-3.0.101-108.68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-source-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-source-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-source-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586" }, "product_reference": "kernel-syms-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.68.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64" }, "product_reference": "kernel-syms-3.0.101-108.68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-syms-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586" }, "product_reference": "kernel-trace-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.68.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64" }, "product_reference": "kernel-trace-3.0.101-108.68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-trace-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.68.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-108.68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.68.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-108.68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586" }, "product_reference": "kernel-xen-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-bigmem-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-base-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-bigmem-base-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-devel-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586" }, "product_reference": "kernel-default-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.68.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64" }, "product_reference": "kernel-default-3.0.101-108.68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-default-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-default-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-default-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586" }, "product_reference": "kernel-default-base-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.68.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-108.68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.68.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-108.68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586" }, "product_reference": "kernel-ec2-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586" }, "product_reference": "kernel-pae-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586" }, "product_reference": "kernel-source-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.68.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64" }, "product_reference": "kernel-source-3.0.101-108.68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-source-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-source-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-source-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586" }, "product_reference": "kernel-syms-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.68.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64" }, "product_reference": "kernel-syms-3.0.101-108.68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-syms-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586" }, "product_reference": "kernel-trace-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.68.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64" }, "product_reference": "kernel-trace-3.0.101-108.68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-trace-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.68.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-108.68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.68.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-108.68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586" }, "product_reference": "kernel-xen-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-8405", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8405" } ], "notes": [ { "category": "general", "text": "An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31651010.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8405", "url": "https://www.suse.com/security/cve/CVE-2016-8405" }, { "category": "external", "summary": "SUSE Bug 1099942 for CVE-2016-8405", "url": "https://bugzilla.suse.com/1099942" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T11:17:33Z", "details": "moderate" } ], "title": "CVE-2016-8405" }, { "cve": "CVE-2017-13305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13305" } ], "notes": [ { "category": "general", "text": "A information disclosure vulnerability in the Upstream kernel encrypted-keys. Product: Android. Versions: Android kernel. Android ID: A-70526974.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13305", "url": "https://www.suse.com/security/cve/CVE-2017-13305" }, { "category": "external", "summary": "SUSE Bug 1094353 for CVE-2017-13305", "url": "https://bugzilla.suse.com/1094353" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2017-13305", "url": "https://bugzilla.suse.com/1105412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T11:17:33Z", "details": "low" } ], "title": "CVE-2017-13305" }, { "cve": "CVE-2018-1000204", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000204" } ], "notes": [ { "category": "general", "text": "Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don\u0027t usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it \"virtually impossible to exploit.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000204", "url": "https://www.suse.com/security/cve/CVE-2018-1000204" }, { "category": "external", "summary": "SUSE Bug 1096728 for CVE-2018-1000204", "url": "https://bugzilla.suse.com/1096728" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-1000204", "url": "https://bugzilla.suse.com/1105412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T11:17:33Z", "details": "moderate" } ], "title": "CVE-2018-1000204" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T11:17:33Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-1130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1130" } ], "notes": [ { "category": "general", "text": "Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1130", "url": "https://www.suse.com/security/cve/CVE-2018-1130" }, { "category": "external", "summary": "SUSE Bug 1092904 for CVE-2018-1130", "url": "https://bugzilla.suse.com/1092904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T11:17:33Z", "details": "moderate" } ], "title": "CVE-2018-1130" }, { "cve": "CVE-2018-12233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12233" } ], "notes": [ { "category": "general", "text": "In the ea_get function in fs/jfs/xattr.c in the Linux kernel through 4.17.1, a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12233", "url": "https://www.suse.com/security/cve/CVE-2018-12233" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-12233", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1097234 for CVE-2018-12233", "url": "https://bugzilla.suse.com/1097234" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-12233", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T11:17:33Z", "details": "moderate" } ], "title": "CVE-2018-12233" }, { "cve": "CVE-2018-13053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13053" } ], "notes": [ { "category": "general", "text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13053", "url": "https://www.suse.com/security/cve/CVE-2018-13053" }, { "category": "external", "summary": "SUSE Bug 1099924 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1099924" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T11:17:33Z", "details": "low" } ], "title": "CVE-2018-13053" }, { "cve": "CVE-2018-13406", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13406" } ], "notes": [ { "category": "general", "text": "An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c in the Linux kernel before 4.17.4 could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13406", "url": "https://www.suse.com/security/cve/CVE-2018-13406" }, { "category": "external", "summary": "SUSE Bug 1098016 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1098016" }, { "category": "external", "summary": "SUSE Bug 1100418 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1100418" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T11:17:33Z", "details": "moderate" } ], "title": "CVE-2018-13406" }, { "cve": "CVE-2018-3620", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3620" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3620", "url": "https://www.suse.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1090340 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1090340" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T11:17:33Z", "details": "moderate" } ], "title": "CVE-2018-3620" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T11:17:33Z", "details": "important" } ], "title": "CVE-2018-3646" }, { "cve": "CVE-2018-5803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5803" } ], "notes": [ { "category": "general", "text": "In the Linux Kernel before version 4.15.8, 4.14.25, 4.9.87, 4.4.121, 4.1.51, and 3.2.102, an error in the \"_sctp_make_chunk()\" function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited to cause a kernel crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5803", "url": "https://www.suse.com/security/cve/CVE-2018-5803" }, { "category": "external", "summary": "SUSE Bug 1083900 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1083900" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T11:17:33Z", "details": "moderate" } ], "title": "CVE-2018-5803" }, { "cve": "CVE-2018-5814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5814" } ], "notes": [ { "category": "general", "text": "In the Linux Kernel before version 4.16.11, 4.14.43, 4.9.102, and 4.4.133, multiple race condition errors when handling probe, disconnect, and rebind operations can be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5814", "url": "https://www.suse.com/security/cve/CVE-2018-5814" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5814", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1096480 for CVE-2018-5814", "url": "https://bugzilla.suse.com/1096480" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2018-5814", "url": "https://bugzilla.suse.com/1133319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T11:17:33Z", "details": "moderate" } ], "title": "CVE-2018-5814" }, { "cve": "CVE-2018-7492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7492" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function in the Linux kernel before 4.14.7 allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7492", "url": "https://www.suse.com/security/cve/CVE-2018-7492" }, { "category": "external", "summary": "SUSE Bug 1082962 for CVE-2018-7492", "url": "https://bugzilla.suse.com/1082962" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T11:17:33Z", "details": "moderate" } ], "title": "CVE-2018-7492" } ] }
suse-su-2018:2342-1
Vulnerability from csaf_suse
Published
2018-08-16 06:05
Modified
2018-08-16 06:05
Summary
Security update for the Linux Kernel (Live Patch 35 for SLE 12)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 35 for SLE 12)
Description of the patch
This update for the Linux Kernel 3.12.61-52_133 fixes several issues.
The following security issues were fixed:
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
Patchnames
SUSE-SLE-SERVER-12-2018-1585
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 35 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_133 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).\n- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn\u0027t propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-1585", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2342-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2342-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182342-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2342-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004426.html" }, { "category": "self", "summary": "SUSE Bug 1097108", "url": "https://bugzilla.suse.com/1097108" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for the Linux Kernel (Live Patch 35 for SLE 12)", "tracking": { "current_release_date": "2018-08-16T06:05:41Z", "generator": { "date": "2018-08-16T06:05:41Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2342-1", "initial_release_date": "2018-08-16T06:05:41Z", "revision_history": [ { "date": "2018-08-16T06:05:41Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_133-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_133-default-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_133-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_133-xen-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_133-xen-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_133-xen-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_133-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_133-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:05:41Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:05:41Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2374-1
Vulnerability from csaf_suse
Published
2018-08-16 09:37
Modified
2018-08-16 09:37
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP3 Azure kernel was updated to 4.4.143 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on
the same CPU core, potentially leaking sensitive data. (bnc#1087081).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).
- CVE-2018-5391: A flaw in the IP packet reassembly could be used by remote attackers to consume CPU time (bnc#1103097).
- CVE-2018-5390: Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bnc#1102340).
- CVE-2018-14734: drivers/infiniband/core/ucma.c allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).
- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn't properly validate the sigevent->sigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bnc#1102851 1103580).
The following non-security bugs were fixed:
- 1wire: family module autoload fails because of upper/lower case mismatch (bnc#1012382).
- Add support for 5,25,50, and 100G to 802.3ad bonding driver (bsc#1096978)
- ahci: Disable LPM on Lenovo 50 series laptops with a too old BIOS (bnc#1012382).
- alsa: hda - Fix pincfg at resume on Lenovo T470 dock (bsc#1099810).
- alsa: hda - Handle kzalloc() failure in snd_hda_attach_pcm_stream() (bnc#1012382).
- alsa: hda/realtek - set PINCFG_HEADSET_MIC to parse_flags (bsc#1099810).
- arm64: do not open code page table entry creation (bsc#1102197).
- arm64: kpti: Use early_param for kpti= command-line option (bsc#1102188).
- arm64: Make sure permission updates happen for pmd/pud (bsc#1102197).
- arm: 8764/1: kgdb: fix NUMREGBYTES so that gdb_regs[] is the correct size (bnc#1012382).
- arm: dts: imx6q: Use correct SDMA script for SPI5 core (bnc#1012382).
- ASoC: cirrus: i2s: Fix LRCLK configuration (bnc#1012382).
- ASoC: cirrus: i2s: Fix {TX|RX}LinCtrlData setup (bnc#1012382).
- ASoC: dapm: delete dapm_kcontrol_data paths list before freeing it (bnc#1012382).
- ath10k: fix rfc1042 header retrieval in QCA4019 with eth decap mode (bnc#1012382).
- atm: zatm: fix memcmp casting (bnc#1012382).
- atm: zatm: Fix potential Spectre v1 (bnc#1012382).
- backlight: as3711_bl: Fix Device Tree node lookup (bnc#1012382).
- backlight: max8925_bl: Fix Device Tree node lookup (bnc#1012382).
- backlight: tps65217_bl: Fix Device Tree node lookup (bnc#1012382).
- bcache: add backing_request_endio() for bi_end_io (bsc#1064232).
- bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1064232).
- bcache: add io_disable to struct cached_dev (bsc#1064232).
- bcache: add journal statistic (bsc#1076110).
- bcache: Add __printf annotation to __bch_check_keys() (bsc#1064232).
- bcache: add stop_when_cache_set_failed option to backing device (bsc#1064232).
- bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1064232).
- bcache: Annotate switch fall-through (bsc#1064232).
- bcache: closures: move control bits one bit right (bsc#1076110).
- bcache: correct flash only vols (check all uuids) (bsc#1064232).
- bcache: count backing device I/O error for writeback I/O (bsc#1064232).
- bcache: Fix a compiler warning in bcache_device_init() (bsc#1064232).
- bcache: fix cached_dev->count usage for bch_cache_set_error() (bsc#1064232).
- bcache: fix crashes in duplicate cache device register (bsc#1076110).
- bcache: fix error return value in memory shrink (bsc#1064232).
- bcache: fix high CPU occupancy during journal (bsc#1076110).
- bcache: Fix, improve efficiency of closure_sync() (bsc#1076110).
- bcache: fix inaccurate io state for detached bcache devices (bsc#1064232).
- bcache: fix incorrect sysfs output value of strip size (bsc#1064232).
- bcache: Fix indentation (bsc#1064232).
- bcache: Fix kernel-doc warnings (bsc#1064232).
- bcache: fix misleading error message in bch_count_io_errors() (bsc#1064232).
- bcache: fix using of loop variable in memory shrink (bsc#1064232).
- bcache: fix writeback target calc on large devices (bsc#1076110).
- bcache: fix wrong return value in bch_debug_init() (bsc#1076110).
- bcache: mark closure_sync() __sched (bsc#1076110).
- bcache: move closure debug file into debug directory (bsc#1064232).
- bcache: reduce cache_set devices iteration by devices_max_used (bsc#1064232).
- bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1064232).
- bcache: Remove an unused variable (bsc#1064232).
- bcache: ret IOERR when read meets metadata error (bsc#1076110).
- bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1064232).
- bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1064232).
- bcache: set dc->io_disable to true in conditional_stop_bcache_device() (bsc#1064232).
- bcache: set error_limit correctly (bsc#1064232).
- bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1064232).
- bcache: stop bcache device when backing device is offline (bsc#1064232).
- bcache: stop dc->writeback_rate_update properly (bsc#1064232).
- bcache: stop writeback thread after detaching (bsc#1076110).
- bcache: store disk name in struct cache and struct cached_dev (bsc#1064232).
- bcache: Suppress more warnings about set-but-not-used variables (bsc#1064232).
- bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1064232).
- bcache: Use PTR_ERR_OR_ZERO() (bsc#1076110).
- bcm63xx_enet: correct clock usage (bnc#1012382).
- bcm63xx_enet: do not write to random DMA channel on BCM6345 (bnc#1012382).
- blkcg: simplify statistic accumulation code (bsc#1082979).
- block: copy ioprio in __bio_clone_fast() (bsc#1082653).
- block: Fix transfer when chunk sectors exceeds max (bnc#1012382).
- block/swim: Fix array bounds check (bsc#1082979).
- bluetooth: Fix connection if directed advertising and privacy is used (bnc#1012382).
- bluetooth: hci_qca: Avoid missing rampatch failure with userspace fw loader (bnc#1012382).
- bonding: re-evaluate force_primary when the primary slave name changes (bnc#1012382).
- bpf: fix loading of BPF_MAXINSNS sized programs (bsc#1012382).
- bpf, x64: fix memleak when not converging after image (bsc#1012382).
- btrfs: fix clone vs chattr NODATASUM race (bnc#1012382).
- btrfs: fix unexpected cow in run_delalloc_nocow (bnc#1012382).
- btrfs: make raid6 rebuild retry more (bnc#1012382).
- btrfs: scrub: Do not use inode pages for device replace (bnc#1012382).
- cachefiles: Fix missing clear of the CACHEFILES_OBJECT_ACTIVE flag (bsc#1099858).
- cachefiles: Fix refcounting bug in backing-file read monitoring (bsc#1099858).
- cachefiles: Wait rather than BUG'ing on 'Unexpected object collision' (bsc#1099858).
- cdc_ncm: avoid padding beyond end of skb (bnc#1012382).
- cifs: fix bad/NULL ptr dereferencing in SMB2_sess_setup() (bsc#1090123).
- cifs: Fix infinite loop when using hard mount option (bnc#1012382).
- compiler, clang: always inline when CONFIG_OPTIMIZE_INLINING is disabled (bnc#1012382).
- compiler, clang: properly override 'inline' for clang (bnc#1012382).
- compiler, clang: suppress warning for unused static inline functions (bnc#1012382).
- compiler-gcc.h: Add __attribute__((gnu_inline)) to all inline declarations (bnc#1012382).
- CONFIG_HOTPLUG_SMT=y
- cpufreq: Fix new policy initialization during limits updates via sysfs (bnc#1012382).
- cpu/hotplug: Add sysfs state interface (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- cpuidle: powernv: Fix promotion from snooze if next state disabled (bnc#1012382).
- crypto: crypto4xx - fix crypto4xx_build_pdr, crypto4xx_build_sdr leak (bnc#1012382).
- crypto: crypto4xx - remove bad list_del (bnc#1012382).
- dm: convert DM printk macros to pr_<level> macros (bsc#1099918).
- dm: fix printk() rate limiting code (bsc#1099918).
- dm thin: handle running out of data space vs concurrent discard (bnc#1012382).
- dm thin metadata: remove needless work from __commit_transaction (bsc#1082979).
- drbd: fix access after free (bnc#1012382).
- driver core: Do not ignore class_dir_create_and_add() failure (bnc#1012382).
- drm/msm: Fix possible null dereference on failure of get_pages() (bsc#1102394).
- drm: re-enable error handling (bsc#1103884).
- esp6: fix memleak on error path in esp6_input (git-fixes).
- ext4: add more inode number paranoia checks (bnc#1012382).
- ext4: add more mount time checks of the superblock (bnc#1012382).
- ext4: always check block group bounds in ext4_init_block_bitmap() (bnc#1012382).
- ext4: check superblock mapped prior to committing (bnc#1012382).
- ext4: clear i_data in ext4_inode_info when removing inline data (bnc#1012382).
- ext4: fix fencepost error in check for inode count overflow during resize (bnc#1012382).
- ext4: include the illegal physical block in the bad map ext4_error msg (bnc#1012382).
- ext4: make sure bitmaps and the inode table do not overlap with bg descriptors (bnc#1012382).
- ext4: only look at the bg_flags field if it is valid (bnc#1012382).
- ext4: update mtime in ext4_punch_hole even if no blocks are released (bnc#1012382).
- ext4: verify the depth of extent tree in ext4_find_extent() (bnc#1012382).
- fscache: Allow cancelled operations to be enqueued (bsc#1099858).
- fscache: Fix reference overput in fscache_attach_object() error handling (bsc#1099858).
- fuse: atomic_o_trunc should truncate pagecache (bnc#1012382).
- fuse: do not keep dead fuse_conn at fuse_fill_super() (bnc#1012382).
- fuse: fix control dir setup and teardown (bnc#1012382).
- genirq: Make force irq threading setup more robust (bsc#1082979).
- hid: debug: check length before copy_to_user() (bnc#1012382).
- hid: hiddev: fix potential Spectre v1 (bnc#1012382).
- hid: i2c-hid: Fix 'incomplete report' noise (bnc#1012382).
- hid: usbhid: add quirk for innomedia INNEX GENESIS/ATARI adapter (bnc#1012382).
- i2c: rcar: fix resume by always initializing registers before transfer (bnc#1012382).
- ib/isert: fix T10-pi check mask setting (bsc#1082979).
- ibmasm: do not write out of bounds in read handler (bnc#1012382).
- ibmvnic: Fix error recovery on login failure (bsc#1101789).
- ibmvnic: Remove code to request error information (bsc#1104174).
- ibmvnic: Revise RX/TX queue error messages (bsc#1101331).
- ibmvnic: Update firmware error reporting with cause string (bsc#1104174).
- ib/qib: Fix DMA api warning with debug kernel (bnc#1012382).
- iio:buffer: make length types match kfifo types (bnc#1012382).
- input: elan_i2c - add ELAN0618 (Lenovo v330 15IKB) ACPI ID (bnc#1012382).
- input: elan_i2c_smbus - fix more potential stack buffer overflows (bnc#1012382).
- input: elantech - enable middle button of touchpads on ThinkPad P52 (bnc#1012382).
- input: elantech - fix V4 report decoding for module with middle key (bnc#1012382).
- iommu/vt-d: Fix race condition in add_unmap() (bsc#1096790, bsc#1097034).
- ipmi:bt: Set the timeout before doing a capabilities check (bnc#1012382).
- ipv4: Fix error return value in fib_convert_metrics() (bnc#1012382).
- ipvs: fix buffer overflow with sync daemon and service (bnc#1012382).
- iw_cxgb4: correctly enforce the max reg_mr depth (bnc#1012382).
- jbd2: do not mark block as modified if the handle is out of credits (bnc#1012382).
- kabi protect net/core/utils.c includes (bsc#1095643).
- kABI: protect struct loop_device (kabi).
- kABI: reintroduce __static_cpu_has_safe (kabi).
- kabi/severities: add 'drivers/md/bcache/* PASS' since no one uses symboles expoted by bcache.
- kbuild: fix # escaping in .cmd files for future Make (bnc#1012382).
- keys: DNS: fix parsing multiple options (bnc#1012382).
- kmod: fix wait on recursive loop (bsc#1099792).
- kmod: reduce atomic operations on kmod_concurrent and simplify (bsc#1099792).
- kmod: throttle kmod thread limit (bsc#1099792).
- kprobes/x86: Do not modify singlestep buffer while resuming (bnc#1012382).
- kvm: arm/arm64: Drop resource size check for GICV window (bsc#1102215).
- kvm: arm/arm64: Set dist->spis to NULL after kfree (bsc#1102214).
- libata: do not try to pass through NCQ commands to non-NCQ devices (bsc#1082979).
- libata: Drop SanDisk SD7UB3Q*G1001 NOLPM quirk (bnc#1012382).
- libata: zpodd: make arrays cdb static, reduces object code size (bnc#1012382).
- libata: zpodd: small read overflow in eject_tray() (bnc#1012382).
- lib/vsprintf: Remove atomic-unsafe support for %pCr (bnc#1012382).
- linvdimm, pmem: Preserve read-only setting for pmem devices (bnc#1012382).
- loop: add recursion validation to LOOP_CHANGE_FD (bnc#1012382).
- loop: remember whether sysfs_create_group() was done (bnc#1012382).
- m68k/mm: Adjust VM area to be unmapped by gap size for __iounmap() (bnc#1012382).
- media: cx231xx: Add support for AverMedia DVD EZMaker 7 (bnc#1012382).
- media: cx25840: Use subdev host data for PLL override (bnc#1012382).
- media: dvb_frontend: fix locking issues at dvb_frontend_get_event() (bnc#1012382).
- media: smiapp: fix timeout checking in smiapp_read_nvm (bsc#1099918).
- media: v4l2-compat-ioctl32: prevent go past max size (bnc#1012382).
- mfd: intel-lpss: Program REMAP register in PIO mode (bnc#1012382).
- mips: ftrace: fix static function graph tracing (bnc#1012382).
- mmc: dw_mmc: fix card threshold control configuration (bsc#1102203).
- mm: check VMA flags to avoid invalid PROT_NONE NUMA balancing (bsc#1097771).
- mm: hugetlb: yield when prepping struct pages (bnc#1012382).
- mtd: cfi_cmdset_0002: Avoid walking all chips when unlocking (bnc#1012382).
- mtd: cfi_cmdset_0002: Change definition naming to retry write operation (bnc#1012382).
- mtd: cfi_cmdset_0002: Change erase functions to check chip good only (bnc#1012382).
- mtd: cfi_cmdset_0002: Change erase functions to retry for error (bnc#1012382).
- mtd: cfi_cmdset_0002: Change write buffer to check correct value (bnc#1012382).
- mtd: cfi_cmdset_0002: fix SEGV unlocking multiple chips (bnc#1012382).
- mtd: cfi_cmdset_0002: Fix unlocking requests crossing a chip boudary (bnc#1012382).
- mtd: cfi_cmdset_0002: Use right chip in do_ppb_xxlock() (bnc#1012382).
- mtd: cmdlinepart: Update comment for introduction of OFFSET_CONTINUOUS (bsc#1099918).
- mtd: partitions: add helper for deleting partition (bsc#1099918).
- mtd: partitions: remove sysfs files when deleting all master's partitions (bsc#1099918).
- mtd: rawnand: mxc: set spare area size register explicitly (bnc#1012382).
- net: cxgb3_main: fix potential Spectre v1 (bnc#1012382).
- net: dccp: avoid crash in ccid3_hc_rx_send_feedback() (bnc#1012382).
- net: dccp: switch rx_tstamp_last_feedback to monotonic clock (bnc#1012382).
- netfilter: ebtables: handle string from userspace with care (bnc#1012382).
- netfilter: ebtables: reject non-bridge targets (bnc#1012382).
- netfilter: nf_log: do not hold nf_log_mutex during user access (bnc#1012382).
- netfilter: nf_queue: augment nfqa_cfg_policy (bnc#1012382).
- netfilter: nf_tables: use WARN_ON_ONCE instead of BUG_ON in nft_do_chain() (bnc#1012382).
- netfilter: x_tables: initialise match/target check parameter struct (bnc#1012382).
- net/mlx5: Fix command interface race in polling mode (bnc#1012382).
- net/mlx5: Fix incorrect raw command length parsing (bnc#1012382).
- net: mvneta: fix the Rx desc DMA address in the Rx path (bsc#1102207).
- net/nfc: Avoid stalls when nfc_alloc_send_skb() returned NULL (bnc#1012382).
- net: off by one in inet6_pton() (bsc#1095643).
- net: phy: marvell: Use strlcpy() for ethtool::get_strings (bsc#1102205).
- net: qmi_wwan: Add Netgear Aircard 779S (bnc#1012382).
- net_sched: blackhole: tell upper qdisc about dropped packets (bnc#1012382).
- net/sonic: Use dma_mapping_error() (bnc#1012382).
- net: sungem: fix rx checksum support (bnc#1012382).
- net/utils: generic inet_pton_with_scope helper (bsc#1095643).
- nfsd: restrict rd_maxcount to svc_max_payload in nfsd_encode_readdir (bnc#1012382).
- NFSv4: Fix possible 1-byte stack overflow in nfs_idmap_read_and_verify_message (bnc#1012382).
- n_tty: Access echo_* variables carefully (bnc#1012382).
- n_tty: Fix stall at n_tty_receive_char_special() (bnc#1012382).
- null_blk: use sector_div instead of do_div (bsc#1082979).
- nvme-pci: initialize queue memory before interrupts (bnc#1012382).
- nvme-rdma: Check remotely invalidated rkey matches our expected rkey (bsc#1092001).
- nvme-rdma: default MR page size to 4k (bsc#1092001).
- nvme-rdma: do not complete requests before a send work request has completed (bsc#1092001).
- nvme-rdma: do not suppress send completions (bsc#1092001).
- nvme-rdma: Fix command completion race at error recovery (bsc#1090435).
- nvme-rdma: make nvme_rdma_[create|destroy]_queue_ib symmetrical (bsc#1092001).
- nvme-rdma: use inet_pton_with_scope helper (bsc#1095643).
- nvme-rdma: Use mr pool (bsc#1092001).
- nvme-rdma: wait for local invalidation before completing a request (bsc#1092001).
- ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent (bnc#1012382).
- of: unittest: for strings, account for trailing \0 in property length field (bnc#1012382).
- ovl: fix random return value on mount (bsc#1099993).
- ovl: fix uid/gid when creating over whiteout (bsc#1099993).
- ovl: override creds with the ones from the superblock mounter (bsc#1099993).
- pci: ibmphp: Fix use-before-set in get_max_bus_speed() (bsc#1100132).
- pci: pciehp: Clear Presence Detect and Data Link Layer Status Changed on resume (bnc#1012382).
- perf intel-pt: Fix decoding to accept CBR between FUP and corresponding TIP (bnc#1012382).
- perf intel-pt: Fix MTC timing after overflow (bnc#1012382).
- perf intel-pt: Fix packet decoding of CYC packets (bnc#1012382).
- perf intel-pt: Fix sync_switch INTEL_PT_SS_NOT_TRACING (bnc#1012382).
- perf intel-pt: Fix 'Unexpected indirect branch' error (bnc#1012382).
- perf tools: Fix symbol and object code resolution for vdso32 and vdsox32 (bnc#1012382).
- perf tools: Move syscall number fallbacks from perf-sys.h to tools/arch/x86/include/asm/ (bnc#1012382).
- PM / hibernate: Fix oops at snapshot_write() (bnc#1012382).
- powerpc/64: Initialise thread_info for emergency stacks (bsc#1094244, bsc#1100930, bsc#1102683).
- powerpc/64s: Exception macro for stack frame and initial register save (bsc#1094244).
- powerpc/64s: Fix mce accounting for powernv (bsc#1094244).
- powerpc/fadump: Unregister fadump on kexec down path (bnc#1012382).
- powerpc: Machine check interrupt is a non-maskable interrupt (bsc#1094244).
- powerpc/mm/hash: Add missing isync prior to kernel stack SLB switch (bnc#1012382).
- powerpc/ptrace: Fix enforcement of DAWR constraints (bnc#1012382).
- powerpc/ptrace: Fix setting 512B aligned breakpoints with PTRACE_SET_DEBUGREG (bnc#1012382).
- qed: Limit msix vectors in kdump kernel to the minimum required count (bnc#1012382).
- qla2xxx: Fix inconsistent DMA mem alloc/free (bsc#1085657).
- qla2xxx: Fix kernel crash due to late workqueue allocation (bsc#1085657).
- qla2xxx: Fix NULL pointer derefrence for fcport search (bsc#1085657).
- r8152: napi hangup fix after disconnect (bnc#1012382).
- RDMA/mlx4: Discard unknown SQP work requests (bnc#1012382).
- RDMA/ocrdma: Fix an error code in ocrdma_alloc_pd() (bsc#1082979).
- RDMA/ocrdma: Fix error codes in ocrdma_create_srq() (bsc#1082979).
- RDMA/ucm: Mark UCM interface as BROKEN (bnc#1012382).
- rds: avoid unenecessary cong_update in loop transport (bnc#1012382).
- restore cond_resched() in shrink_dcache_parent() (bsc#1098599).
- Revert 'block-cancel-workqueue-entries-on-blk_mq_freeze_queue' (bsc#1103717
- Revert 'Btrfs: fix scrub to repair raid6 corruption' (bnc#1012382).
- Revert 'sit: reload iphdr in ipip6_rcv' (bnc#1012382).
- Revert 'x86/cpufeature: Move some of the scattered feature bits to x86_capability' (kabi).
- Revert 'x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6' (kabi).
- rmdir(),rename(): do shrink_dcache_parent() only on success (bsc#1100340).
- rpm/config.sh: Add support for non-default upstream URL Currently the scripts assume Linus' tree as the upstream URL where to pull things from. One may want to package test kernels from other upstream repos. Add support to add an URL to config.sh.
- rtlwifi: rtl8821ae: fix firmware is not ready to run (bnc#1012382).
- run_oldconfig.sh: Add --olddefconfig as an alias to --yes On later kernels there is the make target 'olddefconfig'. This is equvalent to what the '--yes' option does. Therefore, add the option '--olddefconfig' as an alias.
- s390: Correct register corruption in critical section cleanup (bnc#1012382).
- s390/qeth: fix error handling in adapter command callbacks (bnc#1103745, LTC#169699).
- sched/smt: Update sched_smt_present at runtime (bsc#1089343).
- sched/sysctl: Check user input value of sysctl_sched_time_avg (bsc#1100089).
- scsi: lpfc: Change IO submit return to EBUSY if remote port is recovering (bsc#1092207).
- scsi: lpfc: correct oversubscription of nvme io requests for an adapter (bsc#1095453).
- scsi: lpfc: Driver NVME load fails when CPU cnt > WQ resource cnt (bsc#1092207).
- scsi: lpfc: Fix 16gb hbas failing cq create (bsc#1089525).
- scsi: lpfc: Fix 16gb hbas failing cq create (bsc#1095453).
- scsi: lpfc: Fix crash in blk_mq layer when executing modprobe -r lpfc (bsc#1095453).
- scsi: lpfc: Fix MDS diagnostics failure (Rx < Tx) (bsc#1095453).
- scsi: lpfc: Fix port initialization failure (bsc#1095453).
- scsi: lpfc: Fix up log messages and stats counters in IO submit code path (bsc#1092207).
- scsi: lpfc: Handle new link fault code returned by adapter firmware (bsc#1092207).
- scsi: lpfc: update driver version to 11.4.0.7-3 (bsc#1092207).
- scsi: lpfc: update driver version to 11.4.0.7-4 (bsc#1095453).
- scsi: qla2xxx: Fix setting lower transfer speed if GPSC fails (bnc#1012382).
- scsi: qla2xxx: Spinlock recursion in qla_target (bsc#1097501)
- scsi: qlogicpti: Fix an error handling path in 'qpti_sbus_probe()' (bsc#1082979).
- scsi: sg: fix minor memory leak in error path (bsc#1082979).
- scsi: sg: mitigate read/write abuse (bsc#1101296).
- scsi: target: fix crash with iscsi target and dvd (bsc#1082979).
- scsi: zfcp: fix misleading REC trigger trace where erp_action setup failed (LTC#168765 bnc#1012382 bnc#1099713).
- scsi: zfcp: fix missing REC trigger trace for all objects in ERP_FAILED (LTC#168765 bnc#1012382 bnc#1099713).
- scsi: zfcp: fix missing REC trigger trace on enqueue without ERP thread (LTC#168765 bnc#1012382 bnc#1099713).
- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io early return (LTC#168765 bnc#1012382 bnc#1099713).
- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io for ERP_FAILED (LTC#168765 bnc#1012382 bnc#1099713).
- scsi: zfcp: fix missing SCSI trace for result of eh_host_reset_handler (LTC#168765 bnc#1012382 bnc#1099713).
- scsi: zfcp: fix missing SCSI trace for retry of abort / scsi_eh TMF (LTC#168765 bnc#1012382 bnc#1099713).
- serial: sh-sci: Use spin_{try}lock_irqsave instead of open coding version (bnc#1012382).
- signal/xtensa: Consistenly use SIGBUS in do_unaligned_user (bnc#1012382).
- smsc75xx: Add workaround for gigabit link up hardware errata (bsc#1100132).
- smsc95xx: Configure pause time to 0xffff when tx flow control enabled (bsc#1085536).
- spi: Fix scatterlist elements size in spi_map_buf (bnc#1012382).
- staging: android: ion: Return an ERR_PTR in ion_map_kernel (bnc#1012382).
- staging: comedi: quatech_daqp_cs: fix no-op loop daqp_ao_insn_write() (bnc#1012382).
- tcp: do not overshoot window_clamp in tcp_rcv_space_adjust() (bnc#1012382).
- tcp: fix Fast Open key endianness (bnc#1012382).
- tcp: prevent bogus FRTO undos with non-SACK flows (bnc#1012382).
- tcp: verify the checksum of the first data segment in a new connection (bnc#1012382).
- time: Make sure jiffies_to_msecs() preserves non-zero time periods (bnc#1012382).
- tracing: Fix missing return symbol in function_graph output (bnc#1012382).
- ubi: fastmap: Cancel work upon detach (bnc#1012382).
- ubi: fastmap: Correctly handle interrupted erasures in EBA (bnc#1012382).
- ubifs: Fix potential integer overflow in allocation (bnc#1012382).
- udf: Detect incorrect directory size (bnc#1012382).
- Update config files. CONFIG_X86_FAST_FEATURE_TESTS=y
- uprobes/x86: Remove incorrect WARN_ON() in uprobe_init_insn() (bnc#1012382).
- usb: cdc_acm: Add quirk for Uniden UBC125 scanner (bnc#1012382).
- usb: core: handle hub C_PORT_OVER_CURRENT condition (bsc#1100132).
- usb: do not reset if a low-speed or full-speed device timed out (bnc#1012382).
- usb: musb: fix remote wakeup racing with suspend (bnc#1012382).
- usb: quirks: add delay quirks for Corsair Strafe (bnc#1012382).
- usb: serial: ch341: fix type promotion bug in ch341_control_in() (bnc#1012382).
- usb: serial: cp210x: add another USB ID for Qivicon ZigBee stick (bnc#1012382).
- usb: serial: cp210x: add CESINEL device ids (bnc#1012382).
- usb: serial: cp210x: add Silicon Labs IDs for Windows Update (bnc#1012382).
- usb: serial: keyspan_pda: fix modem-status error handling (bnc#1012382).
- usb: serial: mos7840: fix status-register error handling (bnc#1012382).
- usb: yurex: fix out-of-bounds uaccess in read handler (bnc#1012382).
- vfio: platform: Fix reset module leak in error path (bsc#1102211).
- vhost_net: validate sock before trying to put its fd (bnc#1012382).
- video/fbdev/stifb: Return -ENOMEM after a failed kzalloc() in stifb_init_fb() (bsc#1090888 bsc#1099966).
- video: uvesafb: Fix integer overflow in allocation (bnc#1012382).
- vmw_balloon: fix inflation with batching (bnc#1012382).
- w1: mxc_w1: Enable clock before calling clk_get_rate() on it (bnc#1012382).
- wait: add wait_event_killable_timeout() (bsc#1099792).
- watchdog: da9063: Fix setting/changing timeout (bsc#1100843).
- watchdog: da9063: Fix timeout handling during probe (bsc#1100843).
- watchdog: da9063: Fix updating timeout value (bsc#1100843).
- x86/alternatives: Add an auxilary section (bnc#1012382).
- x86/alternatives: Discard dynamic check after init (bnc#1012382).
- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).
- x86/asm: Add _ASM_ARG* constants for argument registers to <asm/asm.h> (bnc#1012382).
- x86/boot: Simplify kernel load address alignment check (bnc#1012382).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343). Update config files.
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpufeature: Add helper macro for mask check macros (bnc#1012382).
- x86/cpufeature: Carve out X86_FEATURE_* (bnc#1012382).
- x86/cpufeature: Get rid of the non-asm goto variant (bnc#1012382).
- x86/cpufeature: Make sure DISABLED/REQUIRED macros are updated (bnc#1012382).
- x86/cpufeature: Move some of the scattered feature bits to x86_capability (bnc#1012382).
- x86/cpufeature: Replace the old static_cpu_has() with safe variant (bnc#1012382).
- x86/cpufeature: Speed up cpu_feature_enabled() (bnc#1012382).
- x86/cpufeature: Update cpufeaure macros (bnc#1012382).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6 (bnc#1012382).
- x86/cpu: Provide a config option to disable static_cpu_has (bnc#1012382).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/fpu: Add an XSTATE_OP() macro (bnc#1012382).
- x86/fpu: Get rid of xstate_fault() (bnc#1012382).
- x86/headers: Do not include asm/processor.h in asm/atomic.h (bnc#1012382).
- x86/mce: Fix incorrect 'Machine check from unknown source' message (bnc#1012382).
- x86/mm/pkeys: Fix mismerge of protection keys CPUID bits (bnc#1012382).
- x86/mm: Simplify p[g4um]d_page() macros (1087081).
- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/topology: Add topology_max_smt_threads() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- x86/vdso: Use static_cpu_has() (bnc#1012382).
- xen/grant-table: log the lack of grants (bnc#1085042).
- xen-netfront: Fix mismatched rtnl_unlock (bnc#1101658).
- xen-netfront: Update features after registering netdev (bnc#1101658).
- xen: Remove unnecessary BUG_ON from __unbind_from_irq() (bnc#1012382).
- xfrm6: avoid potential infinite loop in _decode_session6() (bnc#1012382).
- xfrm: Ignore socket policies when rebuilding hash tables (bnc#1012382).
- xfrm: skip policies marked as dead while rehashing (bnc#1012382).
- xhci: xhci-mem: off by one in xhci_stream_id_to_ring() (bnc#1012382).
Patchnames
SUSE-SLE-SDK-12-SP3-2018-1606,SUSE-SLE-SERVER-12-SP3-2018-1606
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP3 Azure kernel was updated to 4.4.143 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on \nthe same CPU core, potentially leaking sensitive data. (bnc#1087081).\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).\n- CVE-2018-5391: A flaw in the IP packet reassembly could be used by remote attackers to consume CPU time (bnc#1103097).\n- CVE-2018-5390: Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bnc#1102340).\n- CVE-2018-14734: drivers/infiniband/core/ucma.c allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).\n- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bnc#1102851 1103580).\n\nThe following non-security bugs were fixed:\n\n- 1wire: family module autoload fails because of upper/lower case mismatch (bnc#1012382).\n- Add support for 5,25,50, and 100G to 802.3ad bonding driver (bsc#1096978)\n- ahci: Disable LPM on Lenovo 50 series laptops with a too old BIOS (bnc#1012382).\n- alsa: hda - Fix pincfg at resume on Lenovo T470 dock (bsc#1099810).\n- alsa: hda - Handle kzalloc() failure in snd_hda_attach_pcm_stream() (bnc#1012382).\n- alsa: hda/realtek - set PINCFG_HEADSET_MIC to parse_flags (bsc#1099810).\n- arm64: do not open code page table entry creation (bsc#1102197).\n- arm64: kpti: Use early_param for kpti= command-line option (bsc#1102188).\n- arm64: Make sure permission updates happen for pmd/pud (bsc#1102197).\n- arm: 8764/1: kgdb: fix NUMREGBYTES so that gdb_regs[] is the correct size (bnc#1012382).\n- arm: dts: imx6q: Use correct SDMA script for SPI5 core (bnc#1012382).\n- ASoC: cirrus: i2s: Fix LRCLK configuration (bnc#1012382).\n- ASoC: cirrus: i2s: Fix {TX|RX}LinCtrlData setup (bnc#1012382).\n- ASoC: dapm: delete dapm_kcontrol_data paths list before freeing it (bnc#1012382).\n- ath10k: fix rfc1042 header retrieval in QCA4019 with eth decap mode (bnc#1012382).\n- atm: zatm: fix memcmp casting (bnc#1012382).\n- atm: zatm: Fix potential Spectre v1 (bnc#1012382).\n- backlight: as3711_bl: Fix Device Tree node lookup (bnc#1012382).\n- backlight: max8925_bl: Fix Device Tree node lookup (bnc#1012382).\n- backlight: tps65217_bl: Fix Device Tree node lookup (bnc#1012382).\n- bcache: add backing_request_endio() for bi_end_io (bsc#1064232).\n- bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1064232).\n- bcache: add io_disable to struct cached_dev (bsc#1064232).\n- bcache: add journal statistic (bsc#1076110).\n- bcache: Add __printf annotation to __bch_check_keys() (bsc#1064232).\n- bcache: add stop_when_cache_set_failed option to backing device (bsc#1064232).\n- bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1064232).\n- bcache: Annotate switch fall-through (bsc#1064232).\n- bcache: closures: move control bits one bit right (bsc#1076110).\n- bcache: correct flash only vols (check all uuids) (bsc#1064232).\n- bcache: count backing device I/O error for writeback I/O (bsc#1064232).\n- bcache: Fix a compiler warning in bcache_device_init() (bsc#1064232).\n- bcache: fix cached_dev-\u003ecount usage for bch_cache_set_error() (bsc#1064232).\n- bcache: fix crashes in duplicate cache device register (bsc#1076110).\n- bcache: fix error return value in memory shrink (bsc#1064232).\n- bcache: fix high CPU occupancy during journal (bsc#1076110).\n- bcache: Fix, improve efficiency of closure_sync() (bsc#1076110).\n- bcache: fix inaccurate io state for detached bcache devices (bsc#1064232).\n- bcache: fix incorrect sysfs output value of strip size (bsc#1064232).\n- bcache: Fix indentation (bsc#1064232).\n- bcache: Fix kernel-doc warnings (bsc#1064232).\n- bcache: fix misleading error message in bch_count_io_errors() (bsc#1064232).\n- bcache: fix using of loop variable in memory shrink (bsc#1064232).\n- bcache: fix writeback target calc on large devices (bsc#1076110).\n- bcache: fix wrong return value in bch_debug_init() (bsc#1076110).\n- bcache: mark closure_sync() __sched (bsc#1076110).\n- bcache: move closure debug file into debug directory (bsc#1064232).\n- bcache: reduce cache_set devices iteration by devices_max_used (bsc#1064232).\n- bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1064232).\n- bcache: Remove an unused variable (bsc#1064232).\n- bcache: ret IOERR when read meets metadata error (bsc#1076110).\n- bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1064232).\n- bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1064232).\n- bcache: set dc-\u003eio_disable to true in conditional_stop_bcache_device() (bsc#1064232).\n- bcache: set error_limit correctly (bsc#1064232).\n- bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1064232).\n- bcache: stop bcache device when backing device is offline (bsc#1064232).\n- bcache: stop dc-\u003ewriteback_rate_update properly (bsc#1064232).\n- bcache: stop writeback thread after detaching (bsc#1076110).\n- bcache: store disk name in struct cache and struct cached_dev (bsc#1064232).\n- bcache: Suppress more warnings about set-but-not-used variables (bsc#1064232).\n- bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1064232).\n- bcache: Use PTR_ERR_OR_ZERO() (bsc#1076110).\n- bcm63xx_enet: correct clock usage (bnc#1012382).\n- bcm63xx_enet: do not write to random DMA channel on BCM6345 (bnc#1012382).\n- blkcg: simplify statistic accumulation code (bsc#1082979).\n- block: copy ioprio in __bio_clone_fast() (bsc#1082653).\n- block: Fix transfer when chunk sectors exceeds max (bnc#1012382).\n- block/swim: Fix array bounds check (bsc#1082979).\n- bluetooth: Fix connection if directed advertising and privacy is used (bnc#1012382).\n- bluetooth: hci_qca: Avoid missing rampatch failure with userspace fw loader (bnc#1012382).\n- bonding: re-evaluate force_primary when the primary slave name changes (bnc#1012382).\n- bpf: fix loading of BPF_MAXINSNS sized programs (bsc#1012382).\n- bpf, x64: fix memleak when not converging after image (bsc#1012382).\n- btrfs: fix clone vs chattr NODATASUM race (bnc#1012382).\n- btrfs: fix unexpected cow in run_delalloc_nocow (bnc#1012382).\n- btrfs: make raid6 rebuild retry more (bnc#1012382).\n- btrfs: scrub: Do not use inode pages for device replace (bnc#1012382).\n- cachefiles: Fix missing clear of the CACHEFILES_OBJECT_ACTIVE flag (bsc#1099858).\n- cachefiles: Fix refcounting bug in backing-file read monitoring (bsc#1099858).\n- cachefiles: Wait rather than BUG\u0027ing on \u0027Unexpected object collision\u0027 (bsc#1099858).\n- cdc_ncm: avoid padding beyond end of skb (bnc#1012382).\n- cifs: fix bad/NULL ptr dereferencing in SMB2_sess_setup() (bsc#1090123).\n- cifs: Fix infinite loop when using hard mount option (bnc#1012382).\n- compiler, clang: always inline when CONFIG_OPTIMIZE_INLINING is disabled (bnc#1012382).\n- compiler, clang: properly override \u0027inline\u0027 for clang (bnc#1012382).\n- compiler, clang: suppress warning for unused static inline functions (bnc#1012382).\n- compiler-gcc.h: Add __attribute__((gnu_inline)) to all inline declarations (bnc#1012382).\n- CONFIG_HOTPLUG_SMT=y\n- cpufreq: Fix new policy initialization during limits updates via sysfs (bnc#1012382).\n- cpu/hotplug: Add sysfs state interface (bsc#1089343).\n- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).\n- cpu/hotplug: Split do_cpu_down() (bsc#1089343).\n- cpuidle: powernv: Fix promotion from snooze if next state disabled (bnc#1012382).\n- crypto: crypto4xx - fix crypto4xx_build_pdr, crypto4xx_build_sdr leak (bnc#1012382).\n- crypto: crypto4xx - remove bad list_del (bnc#1012382).\n- dm: convert DM printk macros to pr_\u003clevel\u003e macros (bsc#1099918).\n- dm: fix printk() rate limiting code (bsc#1099918).\n- dm thin: handle running out of data space vs concurrent discard (bnc#1012382).\n- dm thin metadata: remove needless work from __commit_transaction (bsc#1082979).\n- drbd: fix access after free (bnc#1012382).\n- driver core: Do not ignore class_dir_create_and_add() failure (bnc#1012382).\n- drm/msm: Fix possible null dereference on failure of get_pages() (bsc#1102394).\n- drm: re-enable error handling (bsc#1103884).\n- esp6: fix memleak on error path in esp6_input (git-fixes).\n- ext4: add more inode number paranoia checks (bnc#1012382).\n- ext4: add more mount time checks of the superblock (bnc#1012382).\n- ext4: always check block group bounds in ext4_init_block_bitmap() (bnc#1012382).\n- ext4: check superblock mapped prior to committing (bnc#1012382).\n- ext4: clear i_data in ext4_inode_info when removing inline data (bnc#1012382).\n- ext4: fix fencepost error in check for inode count overflow during resize (bnc#1012382).\n- ext4: include the illegal physical block in the bad map ext4_error msg (bnc#1012382).\n- ext4: make sure bitmaps and the inode table do not overlap with bg descriptors (bnc#1012382).\n- ext4: only look at the bg_flags field if it is valid (bnc#1012382).\n- ext4: update mtime in ext4_punch_hole even if no blocks are released (bnc#1012382).\n- ext4: verify the depth of extent tree in ext4_find_extent() (bnc#1012382).\n- fscache: Allow cancelled operations to be enqueued (bsc#1099858).\n- fscache: Fix reference overput in fscache_attach_object() error handling (bsc#1099858).\n- fuse: atomic_o_trunc should truncate pagecache (bnc#1012382).\n- fuse: do not keep dead fuse_conn at fuse_fill_super() (bnc#1012382).\n- fuse: fix control dir setup and teardown (bnc#1012382).\n- genirq: Make force irq threading setup more robust (bsc#1082979).\n- hid: debug: check length before copy_to_user() (bnc#1012382).\n- hid: hiddev: fix potential Spectre v1 (bnc#1012382).\n- hid: i2c-hid: Fix \u0027incomplete report\u0027 noise (bnc#1012382).\n- hid: usbhid: add quirk for innomedia INNEX GENESIS/ATARI adapter (bnc#1012382).\n- i2c: rcar: fix resume by always initializing registers before transfer (bnc#1012382).\n- ib/isert: fix T10-pi check mask setting (bsc#1082979).\n- ibmasm: do not write out of bounds in read handler (bnc#1012382).\n- ibmvnic: Fix error recovery on login failure (bsc#1101789).\n- ibmvnic: Remove code to request error information (bsc#1104174).\n- ibmvnic: Revise RX/TX queue error messages (bsc#1101331).\n- ibmvnic: Update firmware error reporting with cause string (bsc#1104174).\n- ib/qib: Fix DMA api warning with debug kernel (bnc#1012382).\n- iio:buffer: make length types match kfifo types (bnc#1012382).\n- input: elan_i2c - add ELAN0618 (Lenovo v330 15IKB) ACPI ID (bnc#1012382).\n- input: elan_i2c_smbus - fix more potential stack buffer overflows (bnc#1012382).\n- input: elantech - enable middle button of touchpads on ThinkPad P52 (bnc#1012382).\n- input: elantech - fix V4 report decoding for module with middle key (bnc#1012382).\n- iommu/vt-d: Fix race condition in add_unmap() (bsc#1096790, bsc#1097034).\n- ipmi:bt: Set the timeout before doing a capabilities check (bnc#1012382).\n- ipv4: Fix error return value in fib_convert_metrics() (bnc#1012382).\n- ipvs: fix buffer overflow with sync daemon and service (bnc#1012382).\n- iw_cxgb4: correctly enforce the max reg_mr depth (bnc#1012382).\n- jbd2: do not mark block as modified if the handle is out of credits (bnc#1012382).\n- kabi protect net/core/utils.c includes (bsc#1095643).\n- kABI: protect struct loop_device (kabi).\n- kABI: reintroduce __static_cpu_has_safe (kabi).\n- kabi/severities: add \u0027drivers/md/bcache/* PASS\u0027 since no one uses symboles expoted by bcache.\n- kbuild: fix # escaping in .cmd files for future Make (bnc#1012382).\n- keys: DNS: fix parsing multiple options (bnc#1012382).\n- kmod: fix wait on recursive loop (bsc#1099792).\n- kmod: reduce atomic operations on kmod_concurrent and simplify (bsc#1099792).\n- kmod: throttle kmod thread limit (bsc#1099792).\n- kprobes/x86: Do not modify singlestep buffer while resuming (bnc#1012382).\n- kvm: arm/arm64: Drop resource size check for GICV window (bsc#1102215).\n- kvm: arm/arm64: Set dist-\u003espis to NULL after kfree (bsc#1102214).\n- libata: do not try to pass through NCQ commands to non-NCQ devices (bsc#1082979).\n- libata: Drop SanDisk SD7UB3Q*G1001 NOLPM quirk (bnc#1012382).\n- libata: zpodd: make arrays cdb static, reduces object code size (bnc#1012382).\n- libata: zpodd: small read overflow in eject_tray() (bnc#1012382).\n- lib/vsprintf: Remove atomic-unsafe support for %pCr (bnc#1012382).\n- linvdimm, pmem: Preserve read-only setting for pmem devices (bnc#1012382).\n- loop: add recursion validation to LOOP_CHANGE_FD (bnc#1012382).\n- loop: remember whether sysfs_create_group() was done (bnc#1012382).\n- m68k/mm: Adjust VM area to be unmapped by gap size for __iounmap() (bnc#1012382).\n- media: cx231xx: Add support for AverMedia DVD EZMaker 7 (bnc#1012382).\n- media: cx25840: Use subdev host data for PLL override (bnc#1012382).\n- media: dvb_frontend: fix locking issues at dvb_frontend_get_event() (bnc#1012382).\n- media: smiapp: fix timeout checking in smiapp_read_nvm (bsc#1099918).\n- media: v4l2-compat-ioctl32: prevent go past max size (bnc#1012382).\n- mfd: intel-lpss: Program REMAP register in PIO mode (bnc#1012382).\n- mips: ftrace: fix static function graph tracing (bnc#1012382).\n- mmc: dw_mmc: fix card threshold control configuration (bsc#1102203).\n- mm: check VMA flags to avoid invalid PROT_NONE NUMA balancing (bsc#1097771).\n- mm: hugetlb: yield when prepping struct pages (bnc#1012382).\n- mtd: cfi_cmdset_0002: Avoid walking all chips when unlocking (bnc#1012382).\n- mtd: cfi_cmdset_0002: Change definition naming to retry write operation (bnc#1012382).\n- mtd: cfi_cmdset_0002: Change erase functions to check chip good only (bnc#1012382).\n- mtd: cfi_cmdset_0002: Change erase functions to retry for error (bnc#1012382).\n- mtd: cfi_cmdset_0002: Change write buffer to check correct value (bnc#1012382).\n- mtd: cfi_cmdset_0002: fix SEGV unlocking multiple chips (bnc#1012382).\n- mtd: cfi_cmdset_0002: Fix unlocking requests crossing a chip boudary (bnc#1012382).\n- mtd: cfi_cmdset_0002: Use right chip in do_ppb_xxlock() (bnc#1012382).\n- mtd: cmdlinepart: Update comment for introduction of OFFSET_CONTINUOUS (bsc#1099918).\n- mtd: partitions: add helper for deleting partition (bsc#1099918).\n- mtd: partitions: remove sysfs files when deleting all master\u0027s partitions (bsc#1099918).\n- mtd: rawnand: mxc: set spare area size register explicitly (bnc#1012382).\n- net: cxgb3_main: fix potential Spectre v1 (bnc#1012382).\n- net: dccp: avoid crash in ccid3_hc_rx_send_feedback() (bnc#1012382).\n- net: dccp: switch rx_tstamp_last_feedback to monotonic clock (bnc#1012382).\n- netfilter: ebtables: handle string from userspace with care (bnc#1012382).\n- netfilter: ebtables: reject non-bridge targets (bnc#1012382).\n- netfilter: nf_log: do not hold nf_log_mutex during user access (bnc#1012382).\n- netfilter: nf_queue: augment nfqa_cfg_policy (bnc#1012382).\n- netfilter: nf_tables: use WARN_ON_ONCE instead of BUG_ON in nft_do_chain() (bnc#1012382).\n- netfilter: x_tables: initialise match/target check parameter struct (bnc#1012382).\n- net/mlx5: Fix command interface race in polling mode (bnc#1012382).\n- net/mlx5: Fix incorrect raw command length parsing (bnc#1012382).\n- net: mvneta: fix the Rx desc DMA address in the Rx path (bsc#1102207).\n- net/nfc: Avoid stalls when nfc_alloc_send_skb() returned NULL (bnc#1012382).\n- net: off by one in inet6_pton() (bsc#1095643).\n- net: phy: marvell: Use strlcpy() for ethtool::get_strings (bsc#1102205).\n- net: qmi_wwan: Add Netgear Aircard 779S (bnc#1012382).\n- net_sched: blackhole: tell upper qdisc about dropped packets (bnc#1012382).\n- net/sonic: Use dma_mapping_error() (bnc#1012382).\n- net: sungem: fix rx checksum support (bnc#1012382).\n- net/utils: generic inet_pton_with_scope helper (bsc#1095643).\n- nfsd: restrict rd_maxcount to svc_max_payload in nfsd_encode_readdir (bnc#1012382).\n- NFSv4: Fix possible 1-byte stack overflow in nfs_idmap_read_and_verify_message (bnc#1012382).\n- n_tty: Access echo_* variables carefully (bnc#1012382).\n- n_tty: Fix stall at n_tty_receive_char_special() (bnc#1012382).\n- null_blk: use sector_div instead of do_div (bsc#1082979).\n- nvme-pci: initialize queue memory before interrupts (bnc#1012382).\n- nvme-rdma: Check remotely invalidated rkey matches our expected rkey (bsc#1092001).\n- nvme-rdma: default MR page size to 4k (bsc#1092001).\n- nvme-rdma: do not complete requests before a send work request has completed (bsc#1092001).\n- nvme-rdma: do not suppress send completions (bsc#1092001).\n- nvme-rdma: Fix command completion race at error recovery (bsc#1090435).\n- nvme-rdma: make nvme_rdma_[create|destroy]_queue_ib symmetrical (bsc#1092001).\n- nvme-rdma: use inet_pton_with_scope helper (bsc#1095643).\n- nvme-rdma: Use mr pool (bsc#1092001).\n- nvme-rdma: wait for local invalidation before completing a request (bsc#1092001).\n- ocfs2: subsystem.su_mutex is required while accessing the item-\u003eci_parent (bnc#1012382).\n- of: unittest: for strings, account for trailing \\0 in property length field (bnc#1012382).\n- ovl: fix random return value on mount (bsc#1099993).\n- ovl: fix uid/gid when creating over whiteout (bsc#1099993).\n- ovl: override creds with the ones from the superblock mounter (bsc#1099993).\n- pci: ibmphp: Fix use-before-set in get_max_bus_speed() (bsc#1100132).\n- pci: pciehp: Clear Presence Detect and Data Link Layer Status Changed on resume (bnc#1012382).\n- perf intel-pt: Fix decoding to accept CBR between FUP and corresponding TIP (bnc#1012382).\n- perf intel-pt: Fix MTC timing after overflow (bnc#1012382).\n- perf intel-pt: Fix packet decoding of CYC packets (bnc#1012382).\n- perf intel-pt: Fix sync_switch INTEL_PT_SS_NOT_TRACING (bnc#1012382).\n- perf intel-pt: Fix \u0027Unexpected indirect branch\u0027 error (bnc#1012382).\n- perf tools: Fix symbol and object code resolution for vdso32 and vdsox32 (bnc#1012382).\n- perf tools: Move syscall number fallbacks from perf-sys.h to tools/arch/x86/include/asm/ (bnc#1012382).\n- PM / hibernate: Fix oops at snapshot_write() (bnc#1012382).\n- powerpc/64: Initialise thread_info for emergency stacks (bsc#1094244, bsc#1100930, bsc#1102683).\n- powerpc/64s: Exception macro for stack frame and initial register save (bsc#1094244).\n- powerpc/64s: Fix mce accounting for powernv (bsc#1094244).\n- powerpc/fadump: Unregister fadump on kexec down path (bnc#1012382).\n- powerpc: Machine check interrupt is a non-maskable interrupt (bsc#1094244).\n- powerpc/mm/hash: Add missing isync prior to kernel stack SLB switch (bnc#1012382).\n- powerpc/ptrace: Fix enforcement of DAWR constraints (bnc#1012382).\n- powerpc/ptrace: Fix setting 512B aligned breakpoints with PTRACE_SET_DEBUGREG (bnc#1012382).\n- qed: Limit msix vectors in kdump kernel to the minimum required count (bnc#1012382).\n- qla2xxx: Fix inconsistent DMA mem alloc/free (bsc#1085657).\n- qla2xxx: Fix kernel crash due to late workqueue allocation (bsc#1085657).\n- qla2xxx: Fix NULL pointer derefrence for fcport search (bsc#1085657).\n- r8152: napi hangup fix after disconnect (bnc#1012382).\n- RDMA/mlx4: Discard unknown SQP work requests (bnc#1012382).\n- RDMA/ocrdma: Fix an error code in ocrdma_alloc_pd() (bsc#1082979).\n- RDMA/ocrdma: Fix error codes in ocrdma_create_srq() (bsc#1082979).\n- RDMA/ucm: Mark UCM interface as BROKEN (bnc#1012382).\n- rds: avoid unenecessary cong_update in loop transport (bnc#1012382).\n- restore cond_resched() in shrink_dcache_parent() (bsc#1098599).\n- Revert \u0027block-cancel-workqueue-entries-on-blk_mq_freeze_queue\u0027 (bsc#1103717\n- Revert \u0027Btrfs: fix scrub to repair raid6 corruption\u0027 (bnc#1012382).\n- Revert \u0027sit: reload iphdr in ipip6_rcv\u0027 (bnc#1012382).\n- Revert \u0027x86/cpufeature: Move some of the scattered feature bits to x86_capability\u0027 (kabi).\n- Revert \u0027x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6\u0027 (kabi).\n- rmdir(),rename(): do shrink_dcache_parent() only on success (bsc#1100340).\n- rpm/config.sh: Add support for non-default upstream URL Currently the scripts assume Linus\u0027 tree as the upstream URL where to pull things from. One may want to package test kernels from other upstream repos. Add support to add an URL to config.sh.\n- rtlwifi: rtl8821ae: fix firmware is not ready to run (bnc#1012382).\n- run_oldconfig.sh: Add --olddefconfig as an alias to --yes On later kernels there is the make target \u0027olddefconfig\u0027. This is equvalent to what the \u0027--yes\u0027 option does. Therefore, add the option \u0027--olddefconfig\u0027 as an alias.\n- s390: Correct register corruption in critical section cleanup (bnc#1012382).\n- s390/qeth: fix error handling in adapter command callbacks (bnc#1103745, LTC#169699).\n- sched/smt: Update sched_smt_present at runtime (bsc#1089343).\n- sched/sysctl: Check user input value of sysctl_sched_time_avg (bsc#1100089).\n- scsi: lpfc: Change IO submit return to EBUSY if remote port is recovering (bsc#1092207).\n- scsi: lpfc: correct oversubscription of nvme io requests for an adapter (bsc#1095453).\n- scsi: lpfc: Driver NVME load fails when CPU cnt \u003e WQ resource cnt (bsc#1092207).\n- scsi: lpfc: Fix 16gb hbas failing cq create (bsc#1089525).\n- scsi: lpfc: Fix 16gb hbas failing cq create (bsc#1095453).\n- scsi: lpfc: Fix crash in blk_mq layer when executing modprobe -r lpfc (bsc#1095453).\n- scsi: lpfc: Fix MDS diagnostics failure (Rx \u003c Tx) (bsc#1095453).\n- scsi: lpfc: Fix port initialization failure (bsc#1095453).\n- scsi: lpfc: Fix up log messages and stats counters in IO submit code path (bsc#1092207).\n- scsi: lpfc: Handle new link fault code returned by adapter firmware (bsc#1092207).\n- scsi: lpfc: update driver version to 11.4.0.7-3 (bsc#1092207).\n- scsi: lpfc: update driver version to 11.4.0.7-4 (bsc#1095453).\n- scsi: qla2xxx: Fix setting lower transfer speed if GPSC fails (bnc#1012382).\n- scsi: qla2xxx: Spinlock recursion in qla_target (bsc#1097501)\n- scsi: qlogicpti: Fix an error handling path in \u0027qpti_sbus_probe()\u0027 (bsc#1082979).\n- scsi: sg: fix minor memory leak in error path (bsc#1082979).\n- scsi: sg: mitigate read/write abuse (bsc#1101296).\n- scsi: target: fix crash with iscsi target and dvd (bsc#1082979).\n- scsi: zfcp: fix misleading REC trigger trace where erp_action setup failed (LTC#168765 bnc#1012382 bnc#1099713).\n- scsi: zfcp: fix missing REC trigger trace for all objects in ERP_FAILED (LTC#168765 bnc#1012382 bnc#1099713).\n- scsi: zfcp: fix missing REC trigger trace on enqueue without ERP thread (LTC#168765 bnc#1012382 bnc#1099713).\n- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io early return (LTC#168765 bnc#1012382 bnc#1099713).\n- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io for ERP_FAILED (LTC#168765 bnc#1012382 bnc#1099713).\n- scsi: zfcp: fix missing SCSI trace for result of eh_host_reset_handler (LTC#168765 bnc#1012382 bnc#1099713).\n- scsi: zfcp: fix missing SCSI trace for retry of abort / scsi_eh TMF (LTC#168765 bnc#1012382 bnc#1099713).\n- serial: sh-sci: Use spin_{try}lock_irqsave instead of open coding version (bnc#1012382).\n- signal/xtensa: Consistenly use SIGBUS in do_unaligned_user (bnc#1012382).\n- smsc75xx: Add workaround for gigabit link up hardware errata (bsc#1100132).\n- smsc95xx: Configure pause time to 0xffff when tx flow control enabled (bsc#1085536).\n- spi: Fix scatterlist elements size in spi_map_buf (bnc#1012382).\n- staging: android: ion: Return an ERR_PTR in ion_map_kernel (bnc#1012382).\n- staging: comedi: quatech_daqp_cs: fix no-op loop daqp_ao_insn_write() (bnc#1012382).\n- tcp: do not overshoot window_clamp in tcp_rcv_space_adjust() (bnc#1012382).\n- tcp: fix Fast Open key endianness (bnc#1012382).\n- tcp: prevent bogus FRTO undos with non-SACK flows (bnc#1012382).\n- tcp: verify the checksum of the first data segment in a new connection (bnc#1012382).\n- time: Make sure jiffies_to_msecs() preserves non-zero time periods (bnc#1012382).\n- tracing: Fix missing return symbol in function_graph output (bnc#1012382).\n- ubi: fastmap: Cancel work upon detach (bnc#1012382).\n- ubi: fastmap: Correctly handle interrupted erasures in EBA (bnc#1012382).\n- ubifs: Fix potential integer overflow in allocation (bnc#1012382).\n- udf: Detect incorrect directory size (bnc#1012382).\n- Update config files. CONFIG_X86_FAST_FEATURE_TESTS=y\n- uprobes/x86: Remove incorrect WARN_ON() in uprobe_init_insn() (bnc#1012382).\n- usb: cdc_acm: Add quirk for Uniden UBC125 scanner (bnc#1012382).\n- usb: core: handle hub C_PORT_OVER_CURRENT condition (bsc#1100132).\n- usb: do not reset if a low-speed or full-speed device timed out (bnc#1012382).\n- usb: musb: fix remote wakeup racing with suspend (bnc#1012382).\n- usb: quirks: add delay quirks for Corsair Strafe (bnc#1012382).\n- usb: serial: ch341: fix type promotion bug in ch341_control_in() (bnc#1012382).\n- usb: serial: cp210x: add another USB ID for Qivicon ZigBee stick (bnc#1012382).\n- usb: serial: cp210x: add CESINEL device ids (bnc#1012382).\n- usb: serial: cp210x: add Silicon Labs IDs for Windows Update (bnc#1012382).\n- usb: serial: keyspan_pda: fix modem-status error handling (bnc#1012382).\n- usb: serial: mos7840: fix status-register error handling (bnc#1012382).\n- usb: yurex: fix out-of-bounds uaccess in read handler (bnc#1012382).\n- vfio: platform: Fix reset module leak in error path (bsc#1102211).\n- vhost_net: validate sock before trying to put its fd (bnc#1012382).\n- video/fbdev/stifb: Return -ENOMEM after a failed kzalloc() in stifb_init_fb() (bsc#1090888 bsc#1099966).\n- video: uvesafb: Fix integer overflow in allocation (bnc#1012382).\n- vmw_balloon: fix inflation with batching (bnc#1012382).\n- w1: mxc_w1: Enable clock before calling clk_get_rate() on it (bnc#1012382).\n- wait: add wait_event_killable_timeout() (bsc#1099792).\n- watchdog: da9063: Fix setting/changing timeout (bsc#1100843).\n- watchdog: da9063: Fix timeout handling during probe (bsc#1100843).\n- watchdog: da9063: Fix updating timeout value (bsc#1100843).\n- x86/alternatives: Add an auxilary section (bnc#1012382).\n- x86/alternatives: Discard dynamic check after init (bnc#1012382).\n- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).\n- x86/asm: Add _ASM_ARG* constants for argument registers to \u003casm/asm.h\u003e (bnc#1012382).\n- x86/boot: Simplify kernel load address alignment check (bnc#1012382).\n- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).\n- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343). Update config files.\n- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).\n- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- x86/cpufeature: Add helper macro for mask check macros (bnc#1012382).\n- x86/cpufeature: Carve out X86_FEATURE_* (bnc#1012382).\n- x86/cpufeature: Get rid of the non-asm goto variant (bnc#1012382).\n- x86/cpufeature: Make sure DISABLED/REQUIRED macros are updated (bnc#1012382).\n- x86/cpufeature: Move some of the scattered feature bits to x86_capability (bnc#1012382).\n- x86/cpufeature: Replace the old static_cpu_has() with safe variant (bnc#1012382).\n- x86/cpufeature: Speed up cpu_feature_enabled() (bnc#1012382).\n- x86/cpufeature: Update cpufeaure macros (bnc#1012382).\n- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6 (bnc#1012382).\n- x86/cpu: Provide a config option to disable static_cpu_has (bnc#1012382).\n- x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- x86/fpu: Add an XSTATE_OP() macro (bnc#1012382).\n- x86/fpu: Get rid of xstate_fault() (bnc#1012382).\n- x86/headers: Do not include asm/processor.h in asm/atomic.h (bnc#1012382).\n- x86/mce: Fix incorrect \u0027Machine check from unknown source\u0027 message (bnc#1012382).\n- x86/mm/pkeys: Fix mismerge of protection keys CPUID bits (bnc#1012382).\n- x86/mm: Simplify p[g4um]d_page() macros (1087081).\n- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).\n- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).\n- x86/topology: Add topology_max_smt_threads() (bsc#1089343).\n- x86/topology: Provide topology_smt_supported() (bsc#1089343).\n- x86/vdso: Use static_cpu_has() (bnc#1012382).\n- xen/grant-table: log the lack of grants (bnc#1085042).\n- xen-netfront: Fix mismatched rtnl_unlock (bnc#1101658).\n- xen-netfront: Update features after registering netdev (bnc#1101658).\n- xen: Remove unnecessary BUG_ON from __unbind_from_irq() (bnc#1012382).\n- xfrm6: avoid potential infinite loop in _decode_session6() (bnc#1012382).\n- xfrm: Ignore socket policies when rebuilding hash tables (bnc#1012382).\n- xfrm: skip policies marked as dead while rehashing (bnc#1012382).\n- xhci: xhci-mem: off by one in xhci_stream_id_to_ring() (bnc#1012382).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SDK-12-SP3-2018-1606,SUSE-SLE-SERVER-12-SP3-2018-1606", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2374-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2374-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182374-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2374-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004449.html" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1023711", "url": "https://bugzilla.suse.com/1023711" }, { "category": "self", "summary": "SUSE Bug 1064232", "url": "https://bugzilla.suse.com/1064232" }, { "category": "self", "summary": "SUSE Bug 1076110", "url": "https://bugzilla.suse.com/1076110" }, { "category": "self", "summary": "SUSE Bug 1078216", "url": "https://bugzilla.suse.com/1078216" }, { "category": "self", "summary": "SUSE Bug 1082653", "url": "https://bugzilla.suse.com/1082653" }, { "category": "self", "summary": "SUSE Bug 1082979", "url": "https://bugzilla.suse.com/1082979" }, { "category": "self", "summary": "SUSE Bug 1085042", "url": "https://bugzilla.suse.com/1085042" }, { "category": "self", "summary": "SUSE Bug 1085536", "url": "https://bugzilla.suse.com/1085536" }, { "category": "self", "summary": "SUSE Bug 1085657", "url": "https://bugzilla.suse.com/1085657" }, { "category": "self", "summary": "SUSE Bug 1087081", "url": "https://bugzilla.suse.com/1087081" }, { "category": "self", "summary": "SUSE Bug 1087659", "url": "https://bugzilla.suse.com/1087659" }, { "category": "self", "summary": "SUSE Bug 1089343", "url": "https://bugzilla.suse.com/1089343" }, { "category": "self", "summary": "SUSE Bug 1089525", "url": "https://bugzilla.suse.com/1089525" }, { "category": "self", "summary": "SUSE Bug 1090123", "url": "https://bugzilla.suse.com/1090123" }, { "category": "self", "summary": "SUSE Bug 1090340", "url": "https://bugzilla.suse.com/1090340" }, { "category": "self", "summary": "SUSE Bug 1090435", "url": "https://bugzilla.suse.com/1090435" }, { "category": "self", "summary": "SUSE Bug 1090888", "url": "https://bugzilla.suse.com/1090888" }, { "category": "self", "summary": "SUSE Bug 1091107", "url": "https://bugzilla.suse.com/1091107" }, { "category": "self", "summary": "SUSE Bug 1092001", "url": "https://bugzilla.suse.com/1092001" }, { "category": "self", "summary": "SUSE Bug 1092207", "url": "https://bugzilla.suse.com/1092207" }, { "category": "self", "summary": "SUSE Bug 1093777", "url": "https://bugzilla.suse.com/1093777" }, { "category": "self", "summary": "SUSE Bug 1094120", "url": "https://bugzilla.suse.com/1094120" }, { "category": "self", "summary": "SUSE Bug 1094244", "url": "https://bugzilla.suse.com/1094244" }, { "category": "self", "summary": "SUSE Bug 1095453", "url": "https://bugzilla.suse.com/1095453" }, { "category": "self", "summary": "SUSE Bug 1095643", "url": "https://bugzilla.suse.com/1095643" }, { "category": "self", "summary": "SUSE Bug 1096790", "url": "https://bugzilla.suse.com/1096790" }, { "category": "self", "summary": "SUSE Bug 1096978", "url": "https://bugzilla.suse.com/1096978" }, { "category": "self", "summary": "SUSE Bug 1097034", "url": "https://bugzilla.suse.com/1097034" }, { "category": "self", "summary": "SUSE Bug 1097501", "url": "https://bugzilla.suse.com/1097501" }, { "category": "self", "summary": "SUSE Bug 1097771", "url": "https://bugzilla.suse.com/1097771" }, { "category": "self", "summary": "SUSE Bug 1098599", "url": "https://bugzilla.suse.com/1098599" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE Bug 1099713", "url": "https://bugzilla.suse.com/1099713" }, { "category": "self", "summary": "SUSE Bug 1099792", "url": "https://bugzilla.suse.com/1099792" }, { "category": "self", "summary": "SUSE Bug 1099810", "url": "https://bugzilla.suse.com/1099810" }, { "category": "self", "summary": "SUSE Bug 1099858", "url": "https://bugzilla.suse.com/1099858" }, { "category": "self", "summary": "SUSE Bug 1099918", "url": "https://bugzilla.suse.com/1099918" }, { "category": "self", "summary": "SUSE Bug 1099966", "url": "https://bugzilla.suse.com/1099966" }, { "category": "self", "summary": "SUSE Bug 1099993", "url": "https://bugzilla.suse.com/1099993" }, { "category": "self", "summary": "SUSE Bug 1100089", "url": "https://bugzilla.suse.com/1100089" }, { "category": "self", "summary": "SUSE Bug 1100132", "url": "https://bugzilla.suse.com/1100132" }, { "category": "self", "summary": "SUSE Bug 1100340", "url": "https://bugzilla.suse.com/1100340" }, { "category": "self", "summary": "SUSE Bug 1100843", "url": "https://bugzilla.suse.com/1100843" }, { "category": "self", "summary": "SUSE Bug 1100930", "url": "https://bugzilla.suse.com/1100930" }, { "category": "self", "summary": "SUSE Bug 1101296", "url": "https://bugzilla.suse.com/1101296" }, { "category": "self", "summary": "SUSE Bug 1101331", "url": "https://bugzilla.suse.com/1101331" }, { "category": "self", "summary": "SUSE Bug 1101658", "url": "https://bugzilla.suse.com/1101658" }, { "category": "self", "summary": "SUSE Bug 1101789", "url": "https://bugzilla.suse.com/1101789" }, { "category": "self", "summary": "SUSE Bug 1102188", "url": "https://bugzilla.suse.com/1102188" }, { "category": "self", "summary": "SUSE Bug 1102197", "url": "https://bugzilla.suse.com/1102197" }, { "category": "self", "summary": "SUSE Bug 1102203", "url": "https://bugzilla.suse.com/1102203" }, { "category": "self", "summary": "SUSE Bug 1102205", "url": "https://bugzilla.suse.com/1102205" }, { "category": "self", "summary": "SUSE Bug 1102207", "url": "https://bugzilla.suse.com/1102207" }, { "category": "self", "summary": "SUSE Bug 1102211", "url": "https://bugzilla.suse.com/1102211" }, { "category": "self", "summary": "SUSE Bug 1102214", "url": "https://bugzilla.suse.com/1102214" }, { "category": "self", "summary": "SUSE Bug 1102215", "url": "https://bugzilla.suse.com/1102215" }, { "category": "self", "summary": "SUSE Bug 1102340", "url": "https://bugzilla.suse.com/1102340" }, { "category": "self", "summary": "SUSE Bug 1102394", "url": "https://bugzilla.suse.com/1102394" }, { "category": "self", "summary": "SUSE Bug 1102683", "url": "https://bugzilla.suse.com/1102683" }, { "category": "self", "summary": "SUSE Bug 1102851", "url": "https://bugzilla.suse.com/1102851" }, { "category": "self", "summary": "SUSE Bug 1103097", "url": "https://bugzilla.suse.com/1103097" }, { "category": "self", "summary": "SUSE Bug 1103119", "url": "https://bugzilla.suse.com/1103119" }, { "category": "self", "summary": "SUSE Bug 1103580", "url": "https://bugzilla.suse.com/1103580" }, { "category": "self", "summary": "SUSE Bug 1103717", "url": "https://bugzilla.suse.com/1103717" }, { "category": "self", "summary": "SUSE Bug 1103745", "url": "https://bugzilla.suse.com/1103745" }, { "category": "self", "summary": "SUSE Bug 1103884", "url": "https://bugzilla.suse.com/1103884" }, { "category": "self", "summary": "SUSE Bug 1104174", "url": "https://bugzilla.suse.com/1104174" }, { "category": "self", "summary": "SUSE Bug 997935", "url": "https://bugzilla.suse.com/997935" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18344 page", "url": "https://www.suse.com/security/cve/CVE-2017-18344/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14734 page", "url": "https://www.suse.com/security/cve/CVE-2018-14734/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3620 page", "url": "https://www.suse.com/security/cve/CVE-2018-3620/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5391 page", "url": "https://www.suse.com/security/cve/CVE-2018-5391/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-08-16T09:37:31Z", "generator": { "date": "2018-08-16T09:37:31Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2374-1", "initial_release_date": "2018-08-16T09:37:31Z", "revision_history": [ { "date": "2018-08-16T09:37:31Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-docs-azure-4.4.143-4.13.1.noarch", "product": { "name": "kernel-docs-azure-4.4.143-4.13.1.noarch", "product_id": "kernel-docs-azure-4.4.143-4.13.1.noarch" } }, { "category": "product_version", "name": "kernel-devel-azure-4.4.143-4.13.1.noarch", "product": { "name": "kernel-devel-azure-4.4.143-4.13.1.noarch", "product_id": "kernel-devel-azure-4.4.143-4.13.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.4.143-4.13.1.noarch", "product": { "name": "kernel-source-azure-4.4.143-4.13.1.noarch", "product_id": "kernel-source-azure-4.4.143-4.13.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-azure-4.4.143-4.13.1.x86_64", "product": { "name": "kernel-azure-4.4.143-4.13.1.x86_64", "product_id": "kernel-azure-4.4.143-4.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.4.143-4.13.1.x86_64", "product": { "name": "kernel-azure-base-4.4.143-4.13.1.x86_64", "product_id": "kernel-azure-base-4.4.143-4.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.4.143-4.13.1.x86_64", "product": { "name": "kernel-azure-devel-4.4.143-4.13.1.x86_64", "product_id": "kernel-azure-devel-4.4.143-4.13.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3", "product": { "name": "SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-azure-4.4.143-4.13.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" }, "product_reference": "kernel-docs-azure-4.4.143-4.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.4.143-4.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64" }, "product_reference": "kernel-azure-4.4.143-4.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.4.143-4.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64" }, "product_reference": "kernel-azure-base-4.4.143-4.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.4.143-4.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64" }, "product_reference": "kernel-azure-devel-4.4.143-4.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.4.143-4.13.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch" }, "product_reference": "kernel-devel-azure-4.4.143-4.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.4.143-4.13.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch" }, "product_reference": "kernel-source-azure-4.4.143-4.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.4.143-4.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64" }, "product_reference": "kernel-azure-4.4.143-4.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.4.143-4.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64" }, "product_reference": "kernel-azure-base-4.4.143-4.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.4.143-4.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64" }, "product_reference": "kernel-azure-devel-4.4.143-4.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.4.143-4.13.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch" }, "product_reference": "kernel-devel-azure-4.4.143-4.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.4.143-4.13.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch" }, "product_reference": "kernel-source-azure-4.4.143-4.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-18344", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18344" } ], "notes": [ { "category": "general", "text": "The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18344", "url": "https://www.suse.com/security/cve/CVE-2017-18344" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102851 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1102851" }, { "category": "external", "summary": "SUSE Bug 1103203 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103203" }, { "category": "external", "summary": "SUSE Bug 1103580 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103580" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T09:37:31Z", "details": "moderate" } ], "title": "CVE-2017-18344" }, { "cve": "CVE-2018-14734", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14734" } ], "notes": [ { "category": "general", "text": "drivers/infiniband/core/ucma.c in the Linux kernel through 4.17.11 allows ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14734", "url": "https://www.suse.com/security/cve/CVE-2018-14734" }, { "category": "external", "summary": "SUSE Bug 1103119 for CVE-2018-14734", "url": "https://bugzilla.suse.com/1103119" }, { "category": "external", "summary": "SUSE Bug 1131390 for CVE-2018-14734", "url": "https://bugzilla.suse.com/1131390" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T09:37:31Z", "details": "low" } ], "title": "CVE-2018-14734" }, { "cve": "CVE-2018-3620", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3620" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3620", "url": "https://www.suse.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1090340 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1090340" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T09:37:31Z", "details": "moderate" } ], "title": "CVE-2018-3620" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T09:37:31Z", "details": "important" } ], "title": "CVE-2018-3646" }, { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T09:37:31Z", "details": "moderate" } ], "title": "CVE-2018-5390" }, { "cve": "CVE-2018-5391", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5391" } ], "notes": [ { "category": "general", "text": "The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5391", "url": "https://www.suse.com/security/cve/CVE-2018-5391" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1108654 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1108654" }, { "category": "external", "summary": "SUSE Bug 1114071 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1114071" }, { "category": "external", "summary": "SUSE Bug 1121102 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1121102" }, { "category": "external", "summary": "SUSE Bug 1134140 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1134140" }, { "category": "external", "summary": "SUSE Bug 1181460 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1181460" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.143-4.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.143-4.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-azure-4.4.143-4.13.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T09:37:31Z", "details": "moderate" } ], "title": "CVE-2018-5391" } ] }
suse-su-2018:2366-1
Vulnerability from csaf_suse
Published
2018-08-16 07:07
Modified
2018-08-16 07:07
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2016-8405: An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. (bnc#1099942).
- CVE-2017-13305: A information disclosure vulnerability existed in the encrypted-keys handling. (bnc#1094353).
- CVE-2018-1000204: A malformed SG_IO ioctl issued for a SCSI device could lead to a local kernel information leak manifesting in up to approximately 1000 memory pages copied to the userspace. The problem has limited scope as non-privileged users usually have no permissions to access SCSI device files. (bnc#1096728).
- CVE-2018-1068: A flaw was found in the implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bnc#1085107).
- CVE-2018-1130: A null pointer dereference in dccp_write_xmit() function in net/dccp/output.c allowed a local user to cause a denial of service by a number of certain crafted system calls (bnc#1092904).
- CVE-2018-12233: In the ea_get function in fs/jfs/xattr.c a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr (bnc#1097234).
- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).
- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c kernel could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 1100418).
- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).
- CVE-2018-5803: An error in the '_sctp_make_chunk()' function (net/sctp/sm_make_chunk.c) when handling SCTP packets length could be exploited to cause a kernel crash (bnc#1083900).
- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations could be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).
- CVE-2018-7492: A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST (bnc#1082962).
The following non-security bugs were fixed:
- cpu/hotplug: Add sysfs state interface (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- disable-prot_none_mitigation.patch: disable prot_none native mitigation (bnc#1104684)
- fix pgd underflow (bnc#1104475) custom walk_page_range rework was incorrect and could underflow pgd if the given range was below a first vma.
- slab: introduce kmalloc_array() (bsc#909361).
- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/topology: Add topology_max_smt_threads() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- xen/x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- xen/x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- xen/x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/mm: Simplify p[g4um]d_page() macros (bnc#1087081, bnc#1104684).
Patchnames
sleposp3-kernel-20180809-13731,slessp3-kernel-20180809-13731,slexsp3-kernel-20180809-13731
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2016-8405: An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. (bnc#1099942).\n- CVE-2017-13305: A information disclosure vulnerability existed in the encrypted-keys handling. (bnc#1094353).\n- CVE-2018-1000204: A malformed SG_IO ioctl issued for a SCSI device could lead to a local kernel information leak manifesting in up to approximately 1000 memory pages copied to the userspace. The problem has limited scope as non-privileged users usually have no permissions to access SCSI device files. (bnc#1096728).\n- CVE-2018-1068: A flaw was found in the implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bnc#1085107).\n- CVE-2018-1130: A null pointer dereference in dccp_write_xmit() function in net/dccp/output.c allowed a local user to cause a denial of service by a number of certain crafted system calls (bnc#1092904).\n- CVE-2018-12233: In the ea_get function in fs/jfs/xattr.c a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr (bnc#1097234).\n- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).\n- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c kernel could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 1100418).\n- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).\n- CVE-2018-5803: An error in the \u0027_sctp_make_chunk()\u0027 function (net/sctp/sm_make_chunk.c) when handling SCTP packets length could be exploited to cause a kernel crash (bnc#1083900).\n- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations could be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).\n- CVE-2018-7492: A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST (bnc#1082962).\n\nThe following non-security bugs were fixed:\n\n- cpu/hotplug: Add sysfs state interface (bsc#1089343).\n- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).\n- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).\n- cpu/hotplug: Split do_cpu_down() (bsc#1089343).\n- disable-prot_none_mitigation.patch: disable prot_none native mitigation (bnc#1104684)\n- fix pgd underflow (bnc#1104475) custom walk_page_range rework was incorrect and could underflow pgd if the given range was below a first vma.\n- slab: introduce kmalloc_array() (bsc#909361).\n- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).\n- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).\n- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).\n- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).\n- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).\n- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).\n- x86/topology: Add topology_max_smt_threads() (bsc#1089343).\n- x86/topology: Provide topology_smt_supported() (bsc#1089343).\n- xen/x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- xen/x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- xen/x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- x86/mm: Simplify p[g4um]d_page() macros (bnc#1087081, bnc#1104684).\n", "title": "Description of the patch" }, { "category": "details", "text": "sleposp3-kernel-20180809-13731,slessp3-kernel-20180809-13731,slexsp3-kernel-20180809-13731", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2366-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2366-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182366-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2366-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" }, { "category": "self", "summary": "SUSE Bug 1082962", "url": "https://bugzilla.suse.com/1082962" }, { "category": "self", "summary": "SUSE Bug 1083900", "url": "https://bugzilla.suse.com/1083900" }, { "category": "self", "summary": "SUSE Bug 1085107", "url": "https://bugzilla.suse.com/1085107" }, { "category": "self", "summary": "SUSE Bug 1087081", "url": "https://bugzilla.suse.com/1087081" }, { "category": "self", "summary": "SUSE Bug 1089343", "url": "https://bugzilla.suse.com/1089343" }, { "category": "self", "summary": "SUSE Bug 1092904", "url": "https://bugzilla.suse.com/1092904" }, { "category": "self", "summary": "SUSE Bug 1094353", "url": "https://bugzilla.suse.com/1094353" }, { "category": "self", "summary": "SUSE Bug 1096480", "url": "https://bugzilla.suse.com/1096480" }, { "category": "self", "summary": "SUSE Bug 1096728", "url": "https://bugzilla.suse.com/1096728" }, { "category": "self", "summary": "SUSE Bug 1097234", "url": "https://bugzilla.suse.com/1097234" }, { "category": "self", "summary": "SUSE Bug 1098016", "url": "https://bugzilla.suse.com/1098016" }, { "category": "self", "summary": "SUSE Bug 1099924", "url": "https://bugzilla.suse.com/1099924" }, { "category": "self", "summary": "SUSE Bug 1099942", "url": "https://bugzilla.suse.com/1099942" }, { "category": "self", "summary": "SUSE Bug 1100418", "url": "https://bugzilla.suse.com/1100418" }, { "category": "self", "summary": "SUSE Bug 1104475", "url": "https://bugzilla.suse.com/1104475" }, { "category": "self", "summary": "SUSE Bug 1104684", "url": "https://bugzilla.suse.com/1104684" }, { "category": "self", "summary": "SUSE Bug 909361", "url": "https://bugzilla.suse.com/909361" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8405 page", "url": "https://www.suse.com/security/cve/CVE-2016-8405/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13305 page", "url": "https://www.suse.com/security/cve/CVE-2017-13305/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000204 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000204/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1130 page", "url": "https://www.suse.com/security/cve/CVE-2018-1130/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12233 page", "url": "https://www.suse.com/security/cve/CVE-2018-12233/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13053 page", "url": "https://www.suse.com/security/cve/CVE-2018-13053/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13406 page", "url": "https://www.suse.com/security/cve/CVE-2018-13406/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3620 page", "url": "https://www.suse.com/security/cve/CVE-2018-3620/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5803 page", "url": "https://www.suse.com/security/cve/CVE-2018-5803/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5814 page", "url": "https://www.suse.com/security/cve/CVE-2018-5814/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7492 page", "url": "https://www.suse.com/security/cve/CVE-2018-7492/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-08-16T07:07:31Z", "generator": { "date": "2018-08-16T07:07:31Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2366-1", "initial_release_date": "2018-08-16T07:07:31Z", "revision_history": [ { "date": "2018-08-16T07:07:31Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.106.43.1.i586", "product": { "name": "kernel-default-3.0.101-0.47.106.43.1.i586", "product_id": "kernel-default-3.0.101-0.47.106.43.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.106.43.1.i586", "product": { "name": "kernel-default-base-3.0.101-0.47.106.43.1.i586", "product_id": "kernel-default-base-3.0.101-0.47.106.43.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.106.43.1.i586", "product": { "name": "kernel-default-devel-3.0.101-0.47.106.43.1.i586", "product_id": "kernel-default-devel-3.0.101-0.47.106.43.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.47.106.43.1.i586", "product": { "name": "kernel-ec2-3.0.101-0.47.106.43.1.i586", "product_id": "kernel-ec2-3.0.101-0.47.106.43.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "product_id": "kernel-ec2-base-3.0.101-0.47.106.43.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "product_id": "kernel-ec2-devel-3.0.101-0.47.106.43.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-0.47.106.43.1.i586", "product": { "name": "kernel-pae-3.0.101-0.47.106.43.1.i586", "product_id": "kernel-pae-3.0.101-0.47.106.43.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-0.47.106.43.1.i586", "product": { "name": "kernel-pae-base-3.0.101-0.47.106.43.1.i586", "product_id": "kernel-pae-base-3.0.101-0.47.106.43.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "product_id": "kernel-pae-devel-3.0.101-0.47.106.43.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.106.43.1.i586", "product": { "name": "kernel-source-3.0.101-0.47.106.43.1.i586", "product_id": "kernel-source-3.0.101-0.47.106.43.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.106.43.1.i586", "product": { "name": "kernel-syms-3.0.101-0.47.106.43.1.i586", "product_id": "kernel-syms-3.0.101-0.47.106.43.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.106.43.1.i586", "product": { "name": "kernel-trace-3.0.101-0.47.106.43.1.i586", "product_id": "kernel-trace-3.0.101-0.47.106.43.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.106.43.1.i586", "product": { "name": "kernel-trace-base-3.0.101-0.47.106.43.1.i586", "product_id": "kernel-trace-base-3.0.101-0.47.106.43.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "product_id": "kernel-trace-devel-3.0.101-0.47.106.43.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.47.106.43.1.i586", "product": { "name": "kernel-xen-3.0.101-0.47.106.43.1.i586", "product_id": "kernel-xen-3.0.101-0.47.106.43.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.47.106.43.1.i586", "product": { "name": "kernel-xen-base-3.0.101-0.47.106.43.1.i586", "product_id": "kernel-xen-base-3.0.101-0.47.106.43.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "product_id": "kernel-xen-devel-3.0.101-0.47.106.43.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.106.43.1.s390x", "product": { "name": "kernel-default-3.0.101-0.47.106.43.1.s390x", "product_id": "kernel-default-3.0.101-0.47.106.43.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.106.43.1.s390x", "product": { "name": "kernel-default-base-3.0.101-0.47.106.43.1.s390x", "product_id": "kernel-default-base-3.0.101-0.47.106.43.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "product_id": "kernel-default-devel-3.0.101-0.47.106.43.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-0.47.106.43.1.s390x", "product": { "name": "kernel-default-man-3.0.101-0.47.106.43.1.s390x", "product_id": "kernel-default-man-3.0.101-0.47.106.43.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.106.43.1.s390x", "product": { "name": "kernel-source-3.0.101-0.47.106.43.1.s390x", "product_id": "kernel-source-3.0.101-0.47.106.43.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.106.43.1.s390x", "product": { "name": "kernel-syms-3.0.101-0.47.106.43.1.s390x", "product_id": "kernel-syms-3.0.101-0.47.106.43.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.106.43.1.s390x", "product": { "name": "kernel-trace-3.0.101-0.47.106.43.1.s390x", "product_id": "kernel-trace-3.0.101-0.47.106.43.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "product_id": "kernel-trace-base-3.0.101-0.47.106.43.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "product_id": "kernel-trace-devel-3.0.101-0.47.106.43.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "product": { "name": "kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "product_id": "kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "product": { "name": "kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "product_id": "kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "product": { "name": "kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "product_id": "kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-0.47.106.43.1.x86_64", "product": { "name": "kernel-default-3.0.101-0.47.106.43.1.x86_64", "product_id": "kernel-default-3.0.101-0.47.106.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "product_id": "kernel-default-base-3.0.101-0.47.106.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "product_id": "kernel-default-devel-3.0.101-0.47.106.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "product_id": "kernel-ec2-3.0.101-0.47.106.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.106.43.1.x86_64", "product": { "name": "kernel-source-3.0.101-0.47.106.43.1.x86_64", "product_id": "kernel-source-3.0.101-0.47.106.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.106.43.1.x86_64", "product": { "name": "kernel-syms-3.0.101-0.47.106.43.1.x86_64", "product_id": "kernel-syms-3.0.101-0.47.106.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.106.43.1.x86_64", "product": { "name": "kernel-trace-3.0.101-0.47.106.43.1.x86_64", "product_id": "kernel-trace-3.0.101-0.47.106.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "product_id": "kernel-trace-base-3.0.101-0.47.106.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.47.106.43.1.x86_64", "product": { "name": "kernel-xen-3.0.101-0.47.106.43.1.x86_64", "product_id": "kernel-xen-3.0.101-0.47.106.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "product_id": "kernel-xen-base-3.0.101-0.47.106.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product": { "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-pos:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-default-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-source-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64" }, "product_reference": "kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64" }, "product_reference": "kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-default-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.106.43.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x" }, "product_reference": "kernel-default-3.0.101-0.47.106.43.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.106.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.106.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.106.43.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-0.47.106.43.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.106.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.106.43.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.106.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-0.47.106.43.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-0.47.106.43.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.106.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-source-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.106.43.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x" }, "product_reference": "kernel-source-3.0.101-0.47.106.43.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.106.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.106.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.106.43.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x" }, "product_reference": "kernel-syms-3.0.101-0.47.106.43.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.106.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.106.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.106.43.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x" }, "product_reference": "kernel-trace-3.0.101-0.47.106.43.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.106.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.47.106.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.106.43.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.106.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.106.43.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.106.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.106.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.106.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-8405", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8405" } ], "notes": [ { "category": "general", "text": "An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31651010.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8405", "url": "https://www.suse.com/security/cve/CVE-2016-8405" }, { "category": "external", "summary": "SUSE Bug 1099942 for CVE-2016-8405", "url": "https://bugzilla.suse.com/1099942" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:07:31Z", "details": "moderate" } ], "title": "CVE-2016-8405" }, { "cve": "CVE-2017-13305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13305" } ], "notes": [ { "category": "general", "text": "A information disclosure vulnerability in the Upstream kernel encrypted-keys. Product: Android. Versions: Android kernel. Android ID: A-70526974.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13305", "url": "https://www.suse.com/security/cve/CVE-2017-13305" }, { "category": "external", "summary": "SUSE Bug 1094353 for CVE-2017-13305", "url": "https://bugzilla.suse.com/1094353" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2017-13305", "url": "https://bugzilla.suse.com/1105412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:07:31Z", "details": "low" } ], "title": "CVE-2017-13305" }, { "cve": "CVE-2018-1000204", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000204" } ], "notes": [ { "category": "general", "text": "Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don\u0027t usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it \"virtually impossible to exploit.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000204", "url": "https://www.suse.com/security/cve/CVE-2018-1000204" }, { "category": "external", "summary": "SUSE Bug 1096728 for CVE-2018-1000204", "url": "https://bugzilla.suse.com/1096728" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-1000204", "url": "https://bugzilla.suse.com/1105412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:07:31Z", "details": "moderate" } ], "title": "CVE-2018-1000204" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:07:31Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-1130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1130" } ], "notes": [ { "category": "general", "text": "Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1130", "url": "https://www.suse.com/security/cve/CVE-2018-1130" }, { "category": "external", "summary": "SUSE Bug 1092904 for CVE-2018-1130", "url": "https://bugzilla.suse.com/1092904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:07:31Z", "details": "moderate" } ], "title": "CVE-2018-1130" }, { "cve": "CVE-2018-12233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12233" } ], "notes": [ { "category": "general", "text": "In the ea_get function in fs/jfs/xattr.c in the Linux kernel through 4.17.1, a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12233", "url": "https://www.suse.com/security/cve/CVE-2018-12233" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-12233", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1097234 for CVE-2018-12233", "url": "https://bugzilla.suse.com/1097234" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-12233", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:07:31Z", "details": "moderate" } ], "title": "CVE-2018-12233" }, { "cve": "CVE-2018-13053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13053" } ], "notes": [ { "category": "general", "text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13053", "url": "https://www.suse.com/security/cve/CVE-2018-13053" }, { "category": "external", "summary": "SUSE Bug 1099924 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1099924" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:07:31Z", "details": "low" } ], "title": "CVE-2018-13053" }, { "cve": "CVE-2018-13406", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13406" } ], "notes": [ { "category": "general", "text": "An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c in the Linux kernel before 4.17.4 could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13406", "url": "https://www.suse.com/security/cve/CVE-2018-13406" }, { "category": "external", "summary": "SUSE Bug 1098016 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1098016" }, { "category": "external", "summary": "SUSE Bug 1100418 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1100418" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:07:31Z", "details": "moderate" } ], "title": "CVE-2018-13406" }, { "cve": "CVE-2018-3620", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3620" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3620", "url": "https://www.suse.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1090340 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1090340" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:07:31Z", "details": "moderate" } ], "title": "CVE-2018-3620" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:07:31Z", "details": "important" } ], "title": "CVE-2018-3646" }, { "cve": "CVE-2018-5803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5803" } ], "notes": [ { "category": "general", "text": "In the Linux Kernel before version 4.15.8, 4.14.25, 4.9.87, 4.4.121, 4.1.51, and 3.2.102, an error in the \"_sctp_make_chunk()\" function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited to cause a kernel crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5803", "url": "https://www.suse.com/security/cve/CVE-2018-5803" }, { "category": "external", "summary": "SUSE Bug 1083900 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1083900" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:07:31Z", "details": "moderate" } ], "title": "CVE-2018-5803" }, { "cve": "CVE-2018-5814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5814" } ], "notes": [ { "category": "general", "text": "In the Linux Kernel before version 4.16.11, 4.14.43, 4.9.102, and 4.4.133, multiple race condition errors when handling probe, disconnect, and rebind operations can be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5814", "url": "https://www.suse.com/security/cve/CVE-2018-5814" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5814", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1096480 for CVE-2018-5814", "url": "https://bugzilla.suse.com/1096480" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2018-5814", "url": "https://bugzilla.suse.com/1133319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:07:31Z", "details": "moderate" } ], "title": "CVE-2018-5814" }, { "cve": "CVE-2018-7492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7492" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function in the Linux kernel before 4.14.7 allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7492", "url": "https://www.suse.com/security/cve/CVE-2018-7492" }, { "category": "external", "summary": "SUSE Bug 1082962 for CVE-2018-7492", "url": "https://bugzilla.suse.com/1082962" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:07:31Z", "details": "moderate" } ], "title": "CVE-2018-7492" } ] }
suse-su-2018:2345-1
Vulnerability from csaf_suse
Published
2018-08-16 06:05
Modified
2018-08-16 06:05
Summary
Security update for the Linux Kernel (Live Patch 34 for SLE 12)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 34 for SLE 12)
Description of the patch
This update for the Linux Kernel 3.12.61-52_128 fixes several issues.
The following security issues were fixed:
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
Patchnames
SUSE-SLE-SERVER-12-2018-1586
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 34 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_128 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).\n- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn\u0027t propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-1586", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2345-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2345-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182345-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2345-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004428.html" }, { "category": "self", "summary": "SUSE Bug 1097108", "url": "https://bugzilla.suse.com/1097108" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for the Linux Kernel (Live Patch 34 for SLE 12)", "tracking": { "current_release_date": "2018-08-16T06:05:49Z", "generator": { "date": "2018-08-16T06:05:49Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2345-1", "initial_release_date": "2018-08-16T06:05:49Z", "revision_history": [ { "date": "2018-08-16T06:05:49Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_128-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_128-default-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_128-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_128-xen-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_128-xen-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_128-xen-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:05:49Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:05:49Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2359-1
Vulnerability from csaf_suse
Published
2018-08-16 06:06
Modified
2018-08-16 06:06
Summary
Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP1)
Description of the patch
This update for the Linux Kernel 3.12.74-60_64_69 fixes several issues.
The following security issues were fixed:
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
Patchnames
SUSE-SLE-SAP-12-SP1-2018-1597,SUSE-SLE-SERVER-12-SP1-2018-1597
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_69 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).\n- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn\u0027t propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-1597,SUSE-SLE-SERVER-12-SP1-2018-1597", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2359-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2359-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182359-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2359-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004441.html" }, { "category": "self", "summary": "SUSE Bug 1097108", "url": "https://bugzilla.suse.com/1097108" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-08-16T06:06:44Z", "generator": { "date": "2018-08-16T06:06:44Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2359-1", "initial_release_date": "2018-08-16T06:06:44Z", "revision_history": [ { "date": "2018-08-16T06:06:44Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_69-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_69-default-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_69-default-6-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_69-xen-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_69-xen-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_69-xen-6-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:06:44Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:06:44Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2637-1
Vulnerability from csaf_suse
Published
2018-09-06 13:01
Modified
2018-09-06 13:01
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2016-8405: An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. (bnc#1099942).
- CVE-2017-13305: A information disclosure vulnerability was fixed in the encrypted-keys handling. (bnc#1094353).
- CVE-2018-1000204: A malformed SG_IO ioctl issued for a SCSI device lead to a local kernel data leak manifesting in up to approximately 1000 memory pages copied to the userspace. The problem has limited scope as non-privileged users usually have no permissions to access SCSI device files. (bnc#1096728).
- CVE-2018-1068: A flaw was found in the implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bnc#1085107).
- CVE-2018-1130: Linux kernel was vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allowed a local user to cause a denial of service by a number of certain crafted system calls (bnc#1092904).
- CVE-2018-12233: In the ea_get function in fs/jfs/xattr.c a memory corruption bug in JFS could be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr (bnc#1097234).
- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).
- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 bnc#1100418).
- CVE-2018-3620: Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis (bnc#1087081).
- CVE-2018-3646: Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis (bnc#1089343 bnc#1104365).
- CVE-2018-5803: An error in the '_sctp_make_chunk()' function (net/sctp/sm_make_chunk.c) when handling SCTP packets length could be exploited to cause a kernel crash (bnc#1083900).
- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations can be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).
- CVE-2018-7492: A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function allowed local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST (bnc#1082962).
The following non-security bugs were fixed:
- usb: add USB_DEVICE_INTERFACE_CLASS macro (bsc#1047487).
- usb: hub: fix non-SS hub-descriptor handling (bsc#1047487).
- usb: kobil_sct: fix non-atomic allocation in write path (bsc#1015828).
- usb: serial: ftdi_sio: fix latency-timer error handling (bsc#1037441).
- usb: serial: io_edgeport: fix NULL-deref at open (bsc#1015828).
- usb: serial: io_edgeport: fix possible sleep-in-atomic (bsc#1037441).
- usb: serial: keyspan_pda: fix modem-status error handling (bsc#1100132).
- usb: visor: Match I330 phone more precisely (bsc#1047487).
- cpu/hotplug: Add sysfs state interface (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- disable prot_none native mitigation (bnc#1104684)
- drm/i915: fix use-after-free in page_flip_completed() (bsc#1103909).
- drm: re-enable error handling (bsc#1103884)
- efivarfs: maintain the efivarfs interfaces when sysfs be created and removed (bsc#1097125).
- fix pgd underflow (bnc#1104475) custom walk_page_range rework was incorrect and could underflow pgd if the given range was below a first vma.
- kthread, tracing: Do not expose half-written comm when creating kthreads (Git-fixes).
- nvme: add device id's with intel stripe quirk (bsc#1097562).
- perf/core: Fix group scheduling with mixed hw and sw events (Git-fixes).
- perf/x86/intel: Handle Broadwell family processors (bsc#1093183).
- s390/qeth: fix IPA command submission race (bnc#1099709, LTC#169004).
- scsi: zfcp: fix infinite iteration on ERP ready list (bnc#1102087, LTC#168038).
- scsi: zfcp: fix misleading REC trigger trace where erp_action setup failed (bnc#1102087, LTC#168765).
- scsi: zfcp: fix missing REC trigger trace for all objects in ERP_FAILED (bnc#1102087, LTC#168765).
- scsi: zfcp: fix missing REC trigger trace on enqueue without ERP thread (bnc#1102087, LTC#168765).
- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io early return (bnc#1102087, LTC#168765).
- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io for ERP_FAILED (bnc#1102087, LTC#168765).
- scsi: zfcp: fix missing SCSI trace for result of eh_host_reset_handler (bnc#1102087, LTC#168765).
- scsi: zfcp: fix missing SCSI trace for retry of abort / scsi_eh TMF (bnc#1102087, LTC#168765).
- series.conf: Remove trailing whitespaces
- slab: introduce kmalloc_array() (bsc#909361).
- smsc75xx: Add workaround for gigabit link up hardware errata (bsc#1100132).
- x64/entry: move ENABLE_IBRS after switching from trampoline stack (bsc#1098658).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).
- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/fpu: fix signal handling with eager FPU switching (bsc#1100091).
- x86/mm: Simplify p[g4um]d_page() macros (bnc#1087081, bnc#1104684).
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).
- x86/topology: Add topology_max_smt_threads() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- x86/traps: Fix bad_iret_stack in fixup_bad_iret() (bsc#1098658).
- x86/traps: add missing kernel CR3 switch in bad_iret path (bsc#1098658).
- xen/x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- xen/x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- xen/x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- xhci: xhci-mem: off by one in xhci_stream_id_to_ring() (bsc#1100132).
Patchnames
slertesp4-kernel-rt-20180827-13770
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 11 SP4 RT kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2016-8405: An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. (bnc#1099942).\n- CVE-2017-13305: A information disclosure vulnerability was fixed in the encrypted-keys handling. (bnc#1094353).\n- CVE-2018-1000204: A malformed SG_IO ioctl issued for a SCSI device lead to a local kernel data leak manifesting in up to approximately 1000 memory pages copied to the userspace. The problem has limited scope as non-privileged users usually have no permissions to access SCSI device files. (bnc#1096728).\n- CVE-2018-1068: A flaw was found in the implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bnc#1085107).\n- CVE-2018-1130: Linux kernel was vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allowed a local user to cause a denial of service by a number of certain crafted system calls (bnc#1092904).\n- CVE-2018-12233: In the ea_get function in fs/jfs/xattr.c a memory corruption bug in JFS could be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr (bnc#1097234).\n- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).\n- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 bnc#1100418).\n- CVE-2018-3620: Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis (bnc#1087081).\n- CVE-2018-3646: Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis (bnc#1089343 bnc#1104365).\n- CVE-2018-5803: An error in the \u0027_sctp_make_chunk()\u0027 function (net/sctp/sm_make_chunk.c) when handling SCTP packets length could be exploited to cause a kernel crash (bnc#1083900).\n- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations can be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).\n- CVE-2018-7492: A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function allowed local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST (bnc#1082962).\n\nThe following non-security bugs were fixed:\n\n- usb: add USB_DEVICE_INTERFACE_CLASS macro (bsc#1047487).\n- usb: hub: fix non-SS hub-descriptor handling (bsc#1047487).\n- usb: kobil_sct: fix non-atomic allocation in write path (bsc#1015828).\n- usb: serial: ftdi_sio: fix latency-timer error handling (bsc#1037441).\n- usb: serial: io_edgeport: fix NULL-deref at open (bsc#1015828).\n- usb: serial: io_edgeport: fix possible sleep-in-atomic (bsc#1037441).\n- usb: serial: keyspan_pda: fix modem-status error handling (bsc#1100132).\n- usb: visor: Match I330 phone more precisely (bsc#1047487).\n- cpu/hotplug: Add sysfs state interface (bsc#1089343).\n- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).\n- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).\n- cpu/hotplug: Split do_cpu_down() (bsc#1089343).\n- disable prot_none native mitigation (bnc#1104684)\n- drm/i915: fix use-after-free in page_flip_completed() (bsc#1103909).\n- drm: re-enable error handling (bsc#1103884)\n- efivarfs: maintain the efivarfs interfaces when sysfs be created and removed (bsc#1097125).\n- fix pgd underflow (bnc#1104475) custom walk_page_range rework was incorrect and could underflow pgd if the given range was below a first vma.\n- kthread, tracing: Do not expose half-written comm when creating kthreads (Git-fixes).\n- nvme: add device id\u0027s with intel stripe quirk (bsc#1097562).\n- perf/core: Fix group scheduling with mixed hw and sw events (Git-fixes).\n- perf/x86/intel: Handle Broadwell family processors (bsc#1093183).\n- s390/qeth: fix IPA command submission race (bnc#1099709, LTC#169004).\n- scsi: zfcp: fix infinite iteration on ERP ready list (bnc#1102087, LTC#168038).\n- scsi: zfcp: fix misleading REC trigger trace where erp_action setup failed (bnc#1102087, LTC#168765).\n- scsi: zfcp: fix missing REC trigger trace for all objects in ERP_FAILED (bnc#1102087, LTC#168765).\n- scsi: zfcp: fix missing REC trigger trace on enqueue without ERP thread (bnc#1102087, LTC#168765).\n- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io early return (bnc#1102087, LTC#168765).\n- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io for ERP_FAILED (bnc#1102087, LTC#168765).\n- scsi: zfcp: fix missing SCSI trace for result of eh_host_reset_handler (bnc#1102087, LTC#168765).\n- scsi: zfcp: fix missing SCSI trace for retry of abort / scsi_eh TMF (bnc#1102087, LTC#168765).\n- series.conf: Remove trailing whitespaces\n- slab: introduce kmalloc_array() (bsc#909361).\n- smsc75xx: Add workaround for gigabit link up hardware errata (bsc#1100132).\n- x64/entry: move ENABLE_IBRS after switching from trampoline stack (bsc#1098658).\n- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).\n- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).\n- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).\n- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).\n- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- x86/fpu: fix signal handling with eager FPU switching (bsc#1100091).\n- x86/mm: Simplify p[g4um]d_page() macros (bnc#1087081, bnc#1104684).\n- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).\n- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).\n- x86/topology: Add topology_max_smt_threads() (bsc#1089343).\n- x86/topology: Provide topology_smt_supported() (bsc#1089343).\n- x86/traps: Fix bad_iret_stack in fixup_bad_iret() (bsc#1098658).\n- x86/traps: add missing kernel CR3 switch in bad_iret path (bsc#1098658).\n- xen/x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- xen/x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- xen/x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- xhci: xhci-mem: off by one in xhci_stream_id_to_ring() (bsc#1100132).\n", "title": "Description of the patch" }, { "category": "details", "text": "slertesp4-kernel-rt-20180827-13770", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2637-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2637-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182637-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2637-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" }, { "category": "self", "summary": "SUSE Bug 1015828", "url": "https://bugzilla.suse.com/1015828" }, { "category": "self", "summary": "SUSE Bug 1037441", "url": "https://bugzilla.suse.com/1037441" }, { "category": "self", "summary": "SUSE Bug 1047487", "url": "https://bugzilla.suse.com/1047487" }, { "category": "self", "summary": "SUSE Bug 1082962", "url": "https://bugzilla.suse.com/1082962" }, { "category": "self", "summary": "SUSE Bug 1083900", "url": "https://bugzilla.suse.com/1083900" }, { "category": "self", "summary": "SUSE Bug 1085107", "url": "https://bugzilla.suse.com/1085107" }, { "category": "self", "summary": "SUSE Bug 1087081", "url": "https://bugzilla.suse.com/1087081" }, { "category": "self", "summary": "SUSE Bug 1089343", "url": "https://bugzilla.suse.com/1089343" }, { "category": "self", "summary": "SUSE Bug 1092904", "url": "https://bugzilla.suse.com/1092904" }, { "category": "self", "summary": "SUSE Bug 1093183", "url": "https://bugzilla.suse.com/1093183" }, { "category": "self", "summary": "SUSE Bug 1094353", "url": "https://bugzilla.suse.com/1094353" }, { "category": "self", "summary": "SUSE Bug 1096480", "url": "https://bugzilla.suse.com/1096480" }, { "category": "self", "summary": "SUSE Bug 1096728", "url": "https://bugzilla.suse.com/1096728" }, { "category": "self", "summary": "SUSE Bug 1097125", "url": "https://bugzilla.suse.com/1097125" }, { "category": "self", "summary": "SUSE Bug 1097234", "url": "https://bugzilla.suse.com/1097234" }, { "category": "self", "summary": "SUSE Bug 1097562", "url": "https://bugzilla.suse.com/1097562" }, { "category": "self", "summary": "SUSE Bug 1098016", "url": "https://bugzilla.suse.com/1098016" }, { "category": "self", "summary": "SUSE Bug 1098658", "url": "https://bugzilla.suse.com/1098658" }, { "category": "self", "summary": "SUSE Bug 1099709", "url": "https://bugzilla.suse.com/1099709" }, { "category": "self", "summary": "SUSE Bug 1099924", "url": "https://bugzilla.suse.com/1099924" }, { "category": "self", "summary": "SUSE Bug 1099942", "url": "https://bugzilla.suse.com/1099942" }, { "category": "self", "summary": "SUSE Bug 1100091", "url": "https://bugzilla.suse.com/1100091" }, { "category": "self", "summary": "SUSE Bug 1100132", "url": "https://bugzilla.suse.com/1100132" }, { "category": "self", "summary": "SUSE Bug 1100418", "url": "https://bugzilla.suse.com/1100418" }, { "category": "self", "summary": "SUSE Bug 1102087", "url": "https://bugzilla.suse.com/1102087" }, { "category": "self", "summary": "SUSE Bug 1103884", "url": "https://bugzilla.suse.com/1103884" }, { "category": "self", "summary": "SUSE Bug 1103909", "url": "https://bugzilla.suse.com/1103909" }, { "category": "self", "summary": "SUSE Bug 1104365", "url": "https://bugzilla.suse.com/1104365" }, { "category": "self", "summary": "SUSE Bug 1104475", "url": "https://bugzilla.suse.com/1104475" }, { "category": "self", "summary": "SUSE Bug 1104684", "url": "https://bugzilla.suse.com/1104684" }, { "category": "self", "summary": "SUSE Bug 909361", "url": "https://bugzilla.suse.com/909361" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8405 page", "url": "https://www.suse.com/security/cve/CVE-2016-8405/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13305 page", "url": "https://www.suse.com/security/cve/CVE-2017-13305/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000204 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000204/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1130 page", "url": "https://www.suse.com/security/cve/CVE-2018-1130/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12233 page", "url": "https://www.suse.com/security/cve/CVE-2018-12233/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13053 page", "url": "https://www.suse.com/security/cve/CVE-2018-13053/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13406 page", "url": "https://www.suse.com/security/cve/CVE-2018-13406/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3620 page", "url": "https://www.suse.com/security/cve/CVE-2018-3620/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5803 page", "url": "https://www.suse.com/security/cve/CVE-2018-5803/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5814 page", "url": "https://www.suse.com/security/cve/CVE-2018-5814/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7492 page", "url": "https://www.suse.com/security/cve/CVE-2018-7492/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-09-06T13:01:35Z", "generator": { "date": "2018-09-06T13:01:35Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2637-1", "initial_release_date": "2018-09-06T13:01:35Z", "revision_history": [ { "date": "2018-09-06T13:01:35Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-rt-3.0.101.rt130-69.33.1.x86_64", "product": { "name": "kernel-rt-3.0.101.rt130-69.33.1.x86_64", "product_id": "kernel-rt-3.0.101.rt130-69.33.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "product": { "name": "kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "product_id": "kernel-rt-base-3.0.101.rt130-69.33.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "product": { "name": "kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "product_id": "kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "product": { "name": "kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "product_id": "kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "product": { "name": "kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "product_id": "kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "product": { "name": "kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "product_id": "kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "product": { "name": "kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "product_id": "kernel-source-rt-3.0.101.rt130-69.33.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64", "product": { "name": "kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64", "product_id": "kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 11 SP4", "product": { "name": "SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:suse-linux-enterprise-rt:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-3.0.101.rt130-69.33.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64" }, "product_reference": "kernel-rt-3.0.101.rt130-69.33.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-3.0.101.rt130-69.33.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64" }, "product_reference": "kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64" }, "product_reference": "kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64" }, "product_reference": "kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64" }, "product_reference": "kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64" }, "product_reference": "kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-3.0.101.rt130-69.33.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64" }, "product_reference": "kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" }, "product_reference": "kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-8405", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8405" } ], "notes": [ { "category": "general", "text": "An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31651010.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8405", "url": "https://www.suse.com/security/cve/CVE-2016-8405" }, { "category": "external", "summary": "SUSE Bug 1099942 for CVE-2016-8405", "url": "https://bugzilla.suse.com/1099942" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-06T13:01:35Z", "details": "moderate" } ], "title": "CVE-2016-8405" }, { "cve": "CVE-2017-13305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13305" } ], "notes": [ { "category": "general", "text": "A information disclosure vulnerability in the Upstream kernel encrypted-keys. Product: Android. Versions: Android kernel. Android ID: A-70526974.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13305", "url": "https://www.suse.com/security/cve/CVE-2017-13305" }, { "category": "external", "summary": "SUSE Bug 1094353 for CVE-2017-13305", "url": "https://bugzilla.suse.com/1094353" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2017-13305", "url": "https://bugzilla.suse.com/1105412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-06T13:01:35Z", "details": "low" } ], "title": "CVE-2017-13305" }, { "cve": "CVE-2018-1000204", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000204" } ], "notes": [ { "category": "general", "text": "Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don\u0027t usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it \"virtually impossible to exploit.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000204", "url": "https://www.suse.com/security/cve/CVE-2018-1000204" }, { "category": "external", "summary": "SUSE Bug 1096728 for CVE-2018-1000204", "url": "https://bugzilla.suse.com/1096728" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-1000204", "url": "https://bugzilla.suse.com/1105412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-06T13:01:35Z", "details": "moderate" } ], "title": "CVE-2018-1000204" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-06T13:01:35Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-1130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1130" } ], "notes": [ { "category": "general", "text": "Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1130", "url": "https://www.suse.com/security/cve/CVE-2018-1130" }, { "category": "external", "summary": "SUSE Bug 1092904 for CVE-2018-1130", "url": "https://bugzilla.suse.com/1092904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-06T13:01:35Z", "details": "moderate" } ], "title": "CVE-2018-1130" }, { "cve": "CVE-2018-12233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12233" } ], "notes": [ { "category": "general", "text": "In the ea_get function in fs/jfs/xattr.c in the Linux kernel through 4.17.1, a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12233", "url": "https://www.suse.com/security/cve/CVE-2018-12233" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-12233", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1097234 for CVE-2018-12233", "url": "https://bugzilla.suse.com/1097234" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-12233", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-06T13:01:35Z", "details": "moderate" } ], "title": "CVE-2018-12233" }, { "cve": "CVE-2018-13053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13053" } ], "notes": [ { "category": "general", "text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13053", "url": "https://www.suse.com/security/cve/CVE-2018-13053" }, { "category": "external", "summary": "SUSE Bug 1099924 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1099924" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-06T13:01:35Z", "details": "low" } ], "title": "CVE-2018-13053" }, { "cve": "CVE-2018-13406", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13406" } ], "notes": [ { "category": "general", "text": "An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c in the Linux kernel before 4.17.4 could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13406", "url": "https://www.suse.com/security/cve/CVE-2018-13406" }, { "category": "external", "summary": "SUSE Bug 1098016 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1098016" }, { "category": "external", "summary": "SUSE Bug 1100418 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1100418" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-06T13:01:35Z", "details": "moderate" } ], "title": "CVE-2018-13406" }, { "cve": "CVE-2018-3620", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3620" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3620", "url": "https://www.suse.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1090340 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1090340" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-06T13:01:35Z", "details": "moderate" } ], "title": "CVE-2018-3620" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-06T13:01:35Z", "details": "important" } ], "title": "CVE-2018-3646" }, { "cve": "CVE-2018-5803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5803" } ], "notes": [ { "category": "general", "text": "In the Linux Kernel before version 4.15.8, 4.14.25, 4.9.87, 4.4.121, 4.1.51, and 3.2.102, an error in the \"_sctp_make_chunk()\" function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited to cause a kernel crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5803", "url": "https://www.suse.com/security/cve/CVE-2018-5803" }, { "category": "external", "summary": "SUSE Bug 1083900 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1083900" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-06T13:01:35Z", "details": "moderate" } ], "title": "CVE-2018-5803" }, { "cve": "CVE-2018-5814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5814" } ], "notes": [ { "category": "general", "text": "In the Linux Kernel before version 4.16.11, 4.14.43, 4.9.102, and 4.4.133, multiple race condition errors when handling probe, disconnect, and rebind operations can be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5814", "url": "https://www.suse.com/security/cve/CVE-2018-5814" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5814", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1096480 for CVE-2018-5814", "url": "https://bugzilla.suse.com/1096480" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2018-5814", "url": "https://bugzilla.suse.com/1133319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-06T13:01:35Z", "details": "moderate" } ], "title": "CVE-2018-5814" }, { "cve": "CVE-2018-7492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7492" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function in the Linux kernel before 4.14.7 allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7492", "url": "https://www.suse.com/security/cve/CVE-2018-7492" }, { "category": "external", "summary": "SUSE Bug 1082962 for CVE-2018-7492", "url": "https://bugzilla.suse.com/1082962" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-06T13:01:35Z", "details": "moderate" } ], "title": "CVE-2018-7492" } ] }
suse-su-2018:2426-1
Vulnerability from csaf_suse
Published
2018-08-17 16:21
Modified
2018-08-17 16:21
Summary
Security update for kernel-livepatch-tools
Notes
Title of the patch
Security update for kernel-livepatch-tools
Description of the patch
This update for kernel-livepatch-tools fixes the following issues:
Add script for disabling SMT to help with the mitigation of the 'L1 Terminal Fault' issue (CVE-2018-3646 bsc#1099306)
The script is called 'klp-kvm-l1tf-ctrl-smt' and is used for enabling or disabling SMT to mitigate
the issue when this administrative decision is taken.
Disabling SMT:
klp-kvm-l1tf-ctrl-smt -d
Enabling SMT:
klp-kvm-l1tf-ctrl-smt -e
Patchnames
SUSE-SLE-Live-Patching-12-SP3-2018-1682,SUSE-SLE-Live-Patching-12-SP3-2018-1683,SUSE-SLE-Module-Live-Patching-15-2018-1687
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kernel-livepatch-tools", "title": "Title of the patch" }, { "category": "description", "text": "This update for kernel-livepatch-tools fixes the following issues:\n\nAdd script for disabling SMT to help with the mitigation of the \u0027L1 Terminal Fault\u0027 issue (CVE-2018-3646 bsc#1099306)\n\nThe script is called \u0027klp-kvm-l1tf-ctrl-smt\u0027 and is used for enabling or disabling SMT to mitigate\nthe issue when this administrative decision is taken.\n\nDisabling SMT:\n\n klp-kvm-l1tf-ctrl-smt -d\n\nEnabling SMT:\n\n klp-kvm-l1tf-ctrl-smt -e\n\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-1682,SUSE-SLE-Live-Patching-12-SP3-2018-1683,SUSE-SLE-Module-Live-Patching-15-2018-1687", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2426-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2426-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182426-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2426-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004473.html" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for kernel-livepatch-tools", "tracking": { "current_release_date": "2018-08-17T16:21:45Z", "generator": { "date": "2018-08-17T16:21:45Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2426-1", "initial_release_date": "2018-08-17T16:21:45Z", "revision_history": [ { "date": "2018-08-17T16:21:45Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_138-94_39-default-2-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_138-94_39-default-2-2.1.ppc64le", "product_id": "kgraft-patch-4_4_138-94_39-default-2-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_140-94_42-default-2-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_140-94_42-default-2-2.1.ppc64le", "product_id": "kgraft-patch-4_4_140-94_42-default-2-2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-tools-1.1-5.3.1.ppc64le", "product": { "name": "kernel-livepatch-tools-1.1-5.3.1.ppc64le", "product_id": "kernel-livepatch-tools-1.1-5.3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_138-94_39-default-2-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_138-94_39-default-2-2.1.x86_64", "product_id": "kgraft-patch-4_4_138-94_39-default-2-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_140-94_42-default-2-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_140-94_42-default-2-2.1.x86_64", "product_id": "kgraft-patch-4_4_140-94_42-default-2-2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-tools-1.1-5.3.1.x86_64", "product": { "name": "kernel-livepatch-tools-1.1-5.3.1.x86_64", "product_id": "kernel-livepatch-tools-1.1-5.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_138-94_39-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_138-94_39-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_138-94_39-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_138-94_39-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_140-94_42-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_140-94_42-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_140-94_42-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_140-94_42-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_138-94_39-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_138-94_39-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_138-94_39-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_138-94_39-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_140-94_42-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-2-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_140-94_42-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_140-94_42-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_140-94_42-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-tools-1.1-5.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-tools-1.1-5.3.1.ppc64le" }, "product_reference": "kernel-livepatch-tools-1.1-5.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-tools-1.1-5.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-tools-1.1-5.3.1.x86_64" }, "product_reference": "kernel-livepatch-tools-1.1-5.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-tools-1.1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-tools-1.1-5.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-tools-1.1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-tools-1.1-5.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-2-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-tools-1.1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-tools-1.1-5.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-17T16:21:45Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2384-1
Vulnerability from csaf_suse
Published
2018-08-16 15:43
Modified
2018-08-16 15:43
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP1 LTSS kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).
- CVE-2018-14734: drivers/infiniband/core/ucma.c allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).
- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had via a large relative timeout because ktime_add_safe is not used (bnc#1099924).
- CVE-2018-13405: The inode_init_owner function in fs/inode.c allowed local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID (bnc#1100416).
- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 bnc#1100418).
The following non-security bugs were fixed:
- bcache: add backing_request_endio() for bi_end_io (bsc#1064233).
- bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1064233).
- bcache: add io_disable to struct cached_dev (bsc#1064233).
- bcache: add journal statistic (bsc#1076110).
- bcache: Add __printf annotation to __bch_check_keys() (bsc#1076110).
- bcache: add stop_when_cache_set_failed option to backing device (bsc#1064233).
- bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1064233).
- bcache: Annotate switch fall-through (bsc#1076110).
- bcache: closures: move control bits one bit right (bsc#1076110).
- bcache: correct flash only vols (check all uuids) (bsc#1064233).
- bcache: count backing device I/O error for writeback I/O (bsc#1064233).
- bcache: do not attach backing with duplicate UUID (bsc#1076110).
- bcache: Fix a compiler warning in bcache_device_init() (bsc#1076110).
- bcache: fix cached_dev->count usage for bch_cache_set_error() (bsc#1064233).
- bcache: fix crashes in duplicate cache device register (bsc#1076110).
- bcache: fix error return value in memory shrink (bsc#1076110).
- bcache: fix for allocator and register thread race (bsc#1076110).
- bcache: fix for data collapse after re-attaching an attached device (bsc#1076110).
- bcache: fix high CPU occupancy during journal (bsc#1076110).
- bcache: Fix, improve efficiency of closure_sync() (bsc#1076110).
- bcache: fix incorrect sysfs output value of strip size (bsc#1076110).
- bcache: Fix indentation (bsc#1076110).
- bcache: fix kcrashes with fio in RAID5 backend dev (bsc#1076110).
- bcache: Fix kernel-doc warnings (bsc#1076110).
- bcache: fix misleading error message in bch_count_io_errors() (bsc#1064233).
- bcache: fix using of loop variable in memory shrink (bsc#1076110).
- bcache: fix writeback target calc on large devices (bsc#1076110).
- bcache: fix wrong return value in bch_debug_init() (bsc#1076110).
- bcache: mark closure_sync() __sched (bsc#1076110).
- bcache: move closure debug file into debug directory (bsc#1076110).
- bcache: properly set task state in bch_writeback_thread() (bsc#1064233).
- bcache: quit dc->writeback_thread when BCACHE_DEV_DETACHING is set (bsc#1064233).
- bcache: reduce cache_set devices iteration by devices_max_used (bsc#1064233).
- bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1076110).
- bcache: Remove an unused variable (bsc#1076110).
- bcache: ret IOERR when read meets metadata error (bsc#1076110).
- bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1064233).
- bcache: return attach error when no cache set exist (bsc#1076110).
- bcache: segregate flash only volume write streams (bsc#1076110).
- bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1064233).
- bcache: set dc->io_disable to true in conditional_stop_bcache_device() (bsc#1064233).
- bcache: set error_limit correctly (bsc#1064233).
- bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1064233).
- bcache: stop bcache device when backing device is offline (bsc#1064233).
- bcache: stop dc->writeback_rate_update properly (bsc#1064233).
- bcache: stop writeback thread after detaching (bsc#1076110).
- bcache: store disk name in struct cache and struct cached_dev (bsc#1064233).
- bcache: Suppress more warnings about set-but-not-used variables (bsc#1076110).
- bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1064233).
- bcache: Use PTR_ERR_OR_ZERO() (bsc#1076110).
- cpu/hotplug: Add sysfs state interface (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- drivers: hv: vmbus: avoid infinite loop in init_vp_index() (bsc#1099592).
- procfs: add tunable for fd/fdinfo dentry retention (bsc#10866542).
- Revert 'KVM: Fix stack-out-of-bounds read in write_mmio' (bnc#1083635).
- sched/sysctl: Check user input value of sysctl_sched_time_avg (bsc#1100089).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] (bnc#1012382).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/mm: Simplify p[g4um]d_page() macros (bnc#1087081).
- x86/mm: Simplify p[g4um]xen: d_page() macros (bnc#1087081).
- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/topology: Add topology_max_smt_threads() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- x86/Xen: disable IBRS around CPU stopper function invocation (none so far).
- xen/x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- xen/x86/cpufeatures: Add X86_BUG_CPU_INSECURE (bnc#1012382).
- xen/x86/cpufeatures: Make CPU bugs sticky (bnc#1012382).
- xen/x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- xen/x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- xen/x86/entry: Add a function to overwrite the RSB (bsc#1068032).
- xen/x86/entry: Stuff RSB for entry to kernel for non-SMEP platform (bsc#1068032).
- xen/x86/entry: Use IBRS on entry to kernel space (bsc#1068032).
- xen/x86/mm: Set IBPB upon context switch (bsc#1068032).
- xen/x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN (bnc#1012382).
Patchnames
SUSE-SLE-Module-Public-Cloud-12-2018-1644,SUSE-SLE-SAP-12-SP1-2018-1644,SUSE-SLE-SERVER-12-SP1-2018-1644
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP1 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).\n- CVE-2018-14734: drivers/infiniband/core/ucma.c allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119).\n- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had via a large relative timeout because ktime_add_safe is not used (bnc#1099924).\n- CVE-2018-13405: The inode_init_owner function in fs/inode.c allowed local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID (bnc#1100416).\n- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 bnc#1100418).\n\nThe following non-security bugs were fixed:\n\n- bcache: add backing_request_endio() for bi_end_io (bsc#1064233).\n- bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1064233).\n- bcache: add io_disable to struct cached_dev (bsc#1064233).\n- bcache: add journal statistic (bsc#1076110).\n- bcache: Add __printf annotation to __bch_check_keys() (bsc#1076110).\n- bcache: add stop_when_cache_set_failed option to backing device (bsc#1064233).\n- bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1064233).\n- bcache: Annotate switch fall-through (bsc#1076110).\n- bcache: closures: move control bits one bit right (bsc#1076110).\n- bcache: correct flash only vols (check all uuids) (bsc#1064233).\n- bcache: count backing device I/O error for writeback I/O (bsc#1064233).\n- bcache: do not attach backing with duplicate UUID (bsc#1076110).\n- bcache: Fix a compiler warning in bcache_device_init() (bsc#1076110).\n- bcache: fix cached_dev-\u003ecount usage for bch_cache_set_error() (bsc#1064233).\n- bcache: fix crashes in duplicate cache device register (bsc#1076110).\n- bcache: fix error return value in memory shrink (bsc#1076110).\n- bcache: fix for allocator and register thread race (bsc#1076110).\n- bcache: fix for data collapse after re-attaching an attached device (bsc#1076110).\n- bcache: fix high CPU occupancy during journal (bsc#1076110).\n- bcache: Fix, improve efficiency of closure_sync() (bsc#1076110).\n- bcache: fix incorrect sysfs output value of strip size (bsc#1076110).\n- bcache: Fix indentation (bsc#1076110).\n- bcache: fix kcrashes with fio in RAID5 backend dev (bsc#1076110).\n- bcache: Fix kernel-doc warnings (bsc#1076110).\n- bcache: fix misleading error message in bch_count_io_errors() (bsc#1064233).\n- bcache: fix using of loop variable in memory shrink (bsc#1076110).\n- bcache: fix writeback target calc on large devices (bsc#1076110).\n- bcache: fix wrong return value in bch_debug_init() (bsc#1076110).\n- bcache: mark closure_sync() __sched (bsc#1076110).\n- bcache: move closure debug file into debug directory (bsc#1076110).\n- bcache: properly set task state in bch_writeback_thread() (bsc#1064233).\n- bcache: quit dc-\u003ewriteback_thread when BCACHE_DEV_DETACHING is set (bsc#1064233).\n- bcache: reduce cache_set devices iteration by devices_max_used (bsc#1064233).\n- bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1076110).\n- bcache: Remove an unused variable (bsc#1076110).\n- bcache: ret IOERR when read meets metadata error (bsc#1076110).\n- bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1064233).\n- bcache: return attach error when no cache set exist (bsc#1076110).\n- bcache: segregate flash only volume write streams (bsc#1076110).\n- bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1064233).\n- bcache: set dc-\u003eio_disable to true in conditional_stop_bcache_device() (bsc#1064233).\n- bcache: set error_limit correctly (bsc#1064233).\n- bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1064233).\n- bcache: stop bcache device when backing device is offline (bsc#1064233).\n- bcache: stop dc-\u003ewriteback_rate_update properly (bsc#1064233).\n- bcache: stop writeback thread after detaching (bsc#1076110).\n- bcache: store disk name in struct cache and struct cached_dev (bsc#1064233).\n- bcache: Suppress more warnings about set-but-not-used variables (bsc#1076110).\n- bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1064233).\n- bcache: Use PTR_ERR_OR_ZERO() (bsc#1076110).\n- cpu/hotplug: Add sysfs state interface (bsc#1089343).\n- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).\n- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).\n- cpu/hotplug: Split do_cpu_down() (bsc#1089343).\n- drivers: hv: vmbus: avoid infinite loop in init_vp_index() (bsc#1099592).\n- procfs: add tunable for fd/fdinfo dentry retention (bsc#10866542).\n- Revert \u0027KVM: Fix stack-out-of-bounds read in write_mmio\u0027 (bnc#1083635).\n- sched/sysctl: Check user input value of sysctl_sched_time_avg (bsc#1100089).\n- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).\n- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).\n- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).\n- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] (bnc#1012382).\n- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- x86/mm: Simplify p[g4um]d_page() macros (bnc#1087081).\n- x86/mm: Simplify p[g4um]xen: d_page() macros (bnc#1087081).\n- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).\n- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).\n- x86/topology: Add topology_max_smt_threads() (bsc#1089343).\n- x86/topology: Provide topology_smt_supported() (bsc#1089343).\n- x86/Xen: disable IBRS around CPU stopper function invocation (none so far).\n- xen/x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- xen/x86/cpufeatures: Add X86_BUG_CPU_INSECURE (bnc#1012382).\n- xen/x86/cpufeatures: Make CPU bugs sticky (bnc#1012382).\n- xen/x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- xen/x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- xen/x86/entry: Add a function to overwrite the RSB (bsc#1068032).\n- xen/x86/entry: Stuff RSB for entry to kernel for non-SMEP platform (bsc#1068032).\n- xen/x86/entry: Use IBRS on entry to kernel space (bsc#1068032).\n- xen/x86/mm: Set IBPB upon context switch (bsc#1068032).\n- xen/x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN (bnc#1012382).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Public-Cloud-12-2018-1644,SUSE-SLE-SAP-12-SP1-2018-1644,SUSE-SLE-SERVER-12-SP1-2018-1644", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2384-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2384-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182384-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2384-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004452.html" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1064233", "url": "https://bugzilla.suse.com/1064233" }, { "category": "self", "summary": "SUSE Bug 1068032", "url": "https://bugzilla.suse.com/1068032" }, { "category": "self", "summary": "SUSE Bug 1076110", "url": "https://bugzilla.suse.com/1076110" }, { "category": "self", "summary": "SUSE Bug 1083635", "url": "https://bugzilla.suse.com/1083635" }, { "category": "self", "summary": "SUSE Bug 1086654", "url": "https://bugzilla.suse.com/1086654" }, { "category": "self", "summary": "SUSE Bug 1087081", "url": "https://bugzilla.suse.com/1087081" }, { "category": "self", "summary": "SUSE Bug 1089343", "url": "https://bugzilla.suse.com/1089343" }, { "category": "self", "summary": "SUSE Bug 1098016", "url": "https://bugzilla.suse.com/1098016" }, { "category": "self", "summary": "SUSE Bug 1099592", "url": "https://bugzilla.suse.com/1099592" }, { "category": "self", "summary": "SUSE Bug 1099924", "url": "https://bugzilla.suse.com/1099924" }, { "category": "self", "summary": "SUSE Bug 1100089", "url": "https://bugzilla.suse.com/1100089" }, { "category": "self", "summary": "SUSE Bug 1100416", "url": "https://bugzilla.suse.com/1100416" }, { "category": "self", "summary": "SUSE Bug 1100418", "url": "https://bugzilla.suse.com/1100418" }, { "category": "self", "summary": "SUSE Bug 1103119", "url": "https://bugzilla.suse.com/1103119" }, { "category": "self", "summary": "SUSE Bug 1104365", "url": "https://bugzilla.suse.com/1104365" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13053 page", "url": "https://www.suse.com/security/cve/CVE-2018-13053/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13405 page", "url": "https://www.suse.com/security/cve/CVE-2018-13405/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13406 page", "url": "https://www.suse.com/security/cve/CVE-2018-13406/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14734 page", "url": "https://www.suse.com/security/cve/CVE-2018-14734/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3620 page", "url": "https://www.suse.com/security/cve/CVE-2018-3620/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-08-16T15:43:46Z", "generator": { "date": "2018-08-16T15:43:46Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2384-1", "initial_release_date": "2018-08-16T15:43:46Z", "revision_history": [ { "date": "2018-08-16T15:43:46Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.74-60.64.99.1.noarch", "product": { "name": "kernel-devel-3.12.74-60.64.99.1.noarch", "product_id": "kernel-devel-3.12.74-60.64.99.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.74-60.64.99.1.noarch", "product": { "name": "kernel-macros-3.12.74-60.64.99.1.noarch", "product_id": "kernel-macros-3.12.74-60.64.99.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.74-60.64.99.1.noarch", "product": { "name": "kernel-source-3.12.74-60.64.99.1.noarch", "product_id": "kernel-source-3.12.74-60.64.99.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.74-60.64.99.1.ppc64le", "product": { "name": "kernel-default-3.12.74-60.64.99.1.ppc64le", "product_id": "kernel-default-3.12.74-60.64.99.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.99.1.ppc64le", "product": { "name": "kernel-default-base-3.12.74-60.64.99.1.ppc64le", "product_id": "kernel-default-base-3.12.74-60.64.99.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "product_id": "kernel-default-devel-3.12.74-60.64.99.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.99.1.ppc64le", "product": { "name": "kernel-syms-3.12.74-60.64.99.1.ppc64le", "product_id": "kernel-syms-3.12.74-60.64.99.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.74-60.64.99.1.s390x", "product": { "name": "kernel-default-3.12.74-60.64.99.1.s390x", "product_id": "kernel-default-3.12.74-60.64.99.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.99.1.s390x", "product": { "name": "kernel-default-base-3.12.74-60.64.99.1.s390x", "product_id": "kernel-default-base-3.12.74-60.64.99.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.99.1.s390x", "product": { "name": "kernel-default-devel-3.12.74-60.64.99.1.s390x", "product_id": "kernel-default-devel-3.12.74-60.64.99.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.74-60.64.99.1.s390x", "product": { "name": "kernel-default-man-3.12.74-60.64.99.1.s390x", "product_id": "kernel-default-man-3.12.74-60.64.99.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.99.1.s390x", "product": { "name": "kernel-syms-3.12.74-60.64.99.1.s390x", "product_id": "kernel-syms-3.12.74-60.64.99.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-ec2-3.12.74-60.64.99.1.x86_64", "product": { "name": "kernel-ec2-3.12.74-60.64.99.1.x86_64", "product_id": "kernel-ec2-3.12.74-60.64.99.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.74-60.64.99.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.74-60.64.99.1.x86_64", "product_id": "kernel-ec2-devel-3.12.74-60.64.99.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.74-60.64.99.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.74-60.64.99.1.x86_64", "product_id": "kernel-ec2-extra-3.12.74-60.64.99.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.12.74-60.64.99.1.x86_64", "product": { "name": "kernel-default-3.12.74-60.64.99.1.x86_64", "product_id": "kernel-default-3.12.74-60.64.99.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.99.1.x86_64", "product": { "name": "kernel-default-base-3.12.74-60.64.99.1.x86_64", "product_id": "kernel-default-base-3.12.74-60.64.99.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.99.1.x86_64", "product": { "name": "kernel-default-devel-3.12.74-60.64.99.1.x86_64", "product_id": "kernel-default-devel-3.12.74-60.64.99.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.99.1.x86_64", "product": { "name": "kernel-syms-3.12.74-60.64.99.1.x86_64", "product_id": "kernel-syms-3.12.74-60.64.99.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.74-60.64.99.1.x86_64", "product": { "name": "kernel-xen-3.12.74-60.64.99.1.x86_64", "product_id": "kernel-xen-3.12.74-60.64.99.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.74-60.64.99.1.x86_64", "product": { "name": "kernel-xen-base-3.12.74-60.64.99.1.x86_64", "product_id": "kernel-xen-base-3.12.74-60.64.99.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "product_id": "kernel-xen-devel-3.12.74-60.64.99.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64" } }, { "category": "product_version", "name": "lttng-modules-2.7.0-4.2.1.x86_64", "product": { "name": "lttng-modules-2.7.0-4.2.1.x86_64", "product_id": "lttng-modules-2.7.0-4.2.1.x86_64" } }, { "category": "product_version", "name": "lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64", "product": { "name": "lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64", "product_id": "lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.74-60.64.99.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.99.1.x86_64" }, "product_reference": "kernel-ec2-3.12.74-60.64.99.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.74-60.64.99.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.99.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.74-60.64.99.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.74-60.64.99.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.99.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.74-60.64.99.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.99.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.ppc64le" }, "product_reference": "kernel-default-3.12.74-60.64.99.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.99.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.x86_64" }, "product_reference": "kernel-default-3.12.74-60.64.99.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.99.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.74-60.64.99.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.99.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.x86_64" }, "product_reference": "kernel-default-base-3.12.74-60.64.99.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.99.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.99.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.74-60.64.99.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.74-60.64.99.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.99.1.noarch" }, "product_reference": "kernel-devel-3.12.74-60.64.99.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.74-60.64.99.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.99.1.noarch" }, "product_reference": "kernel-macros-3.12.74-60.64.99.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.74-60.64.99.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.99.1.noarch" }, "product_reference": "kernel-source-3.12.74-60.64.99.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.99.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.ppc64le" }, "product_reference": "kernel-syms-3.12.74-60.64.99.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.99.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.x86_64" }, "product_reference": "kernel-syms-3.12.74-60.64.99.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.74-60.64.99.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.99.1.x86_64" }, "product_reference": "kernel-xen-3.12.74-60.64.99.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.74-60.64.99.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.99.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.74-60.64.99.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.74-60.64.99.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.99.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-2.7.0-4.2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.2.1.x86_64" }, "product_reference": "lttng-modules-2.7.0-4.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64" }, "product_reference": "lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.99.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.ppc64le" }, "product_reference": "kernel-default-3.12.74-60.64.99.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.99.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.s390x" }, "product_reference": "kernel-default-3.12.74-60.64.99.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.99.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.x86_64" }, "product_reference": "kernel-default-3.12.74-60.64.99.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.99.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.74-60.64.99.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.99.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.s390x" }, "product_reference": "kernel-default-base-3.12.74-60.64.99.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.99.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.x86_64" }, "product_reference": "kernel-default-base-3.12.74-60.64.99.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.99.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.99.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.s390x" }, "product_reference": "kernel-default-devel-3.12.74-60.64.99.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.99.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.74-60.64.99.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.74-60.64.99.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.99.1.s390x" }, "product_reference": "kernel-default-man-3.12.74-60.64.99.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.74-60.64.99.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.99.1.noarch" }, "product_reference": "kernel-devel-3.12.74-60.64.99.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.74-60.64.99.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.99.1.noarch" }, "product_reference": "kernel-macros-3.12.74-60.64.99.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.74-60.64.99.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.99.1.noarch" }, "product_reference": "kernel-source-3.12.74-60.64.99.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.99.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.ppc64le" }, "product_reference": "kernel-syms-3.12.74-60.64.99.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.99.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.s390x" }, "product_reference": "kernel-syms-3.12.74-60.64.99.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.99.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.x86_64" }, "product_reference": "kernel-syms-3.12.74-60.64.99.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.74-60.64.99.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.99.1.x86_64" }, "product_reference": "kernel-xen-3.12.74-60.64.99.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.74-60.64.99.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.99.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.74-60.64.99.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.74-60.64.99.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.99.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-2.7.0-4.2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.2.1.x86_64" }, "product_reference": "lttng-modules-2.7.0-4.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64" }, "product_reference": "lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-13053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13053" } ], "notes": [ { "category": "general", "text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13053", "url": "https://www.suse.com/security/cve/CVE-2018-13053" }, { "category": "external", "summary": "SUSE Bug 1099924 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1099924" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T15:43:46Z", "details": "low" } ], "title": "CVE-2018-13053" }, { "cve": "CVE-2018-13405", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13405" } ], "notes": [ { "category": "general", "text": "The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13405", "url": "https://www.suse.com/security/cve/CVE-2018-13405" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1100416 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1100416" }, { "category": "external", "summary": "SUSE Bug 1129735 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1129735" }, { "category": "external", "summary": "SUSE Bug 1195161 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1195161" }, { "category": "external", "summary": "SUSE Bug 1198702 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1198702" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T15:43:46Z", "details": "moderate" } ], "title": "CVE-2018-13405" }, { "cve": "CVE-2018-13406", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13406" } ], "notes": [ { "category": "general", "text": "An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c in the Linux kernel before 4.17.4 could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13406", "url": "https://www.suse.com/security/cve/CVE-2018-13406" }, { "category": "external", "summary": "SUSE Bug 1098016 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1098016" }, { "category": "external", "summary": "SUSE Bug 1100418 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1100418" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T15:43:46Z", "details": "moderate" } ], "title": "CVE-2018-13406" }, { "cve": "CVE-2018-14734", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14734" } ], "notes": [ { "category": "general", "text": "drivers/infiniband/core/ucma.c in the Linux kernel through 4.17.11 allows ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14734", "url": "https://www.suse.com/security/cve/CVE-2018-14734" }, { "category": "external", "summary": "SUSE Bug 1103119 for CVE-2018-14734", "url": "https://bugzilla.suse.com/1103119" }, { "category": "external", "summary": "SUSE Bug 1131390 for CVE-2018-14734", "url": "https://bugzilla.suse.com/1131390" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T15:43:46Z", "details": "low" } ], "title": "CVE-2018-14734" }, { "cve": "CVE-2018-3620", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3620" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3620", "url": "https://www.suse.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1090340 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1090340" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T15:43:46Z", "details": "moderate" } ], "title": "CVE-2018-3620" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.99-4.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T15:43:46Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2414-1
Vulnerability from csaf_suse
Published
2018-08-17 14:58
Modified
2018-08-17 14:58
Summary
Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP3)
Description of the patch
This update for the Linux Kernel 4.4.132-94_33 fixes several issues.
The following security issues were fixed:
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
Patchnames
SUSE-SLE-Live-Patching-12-SP3-2018-1678,SUSE-SLE-Live-Patching-12-SP3-2018-1679,SUSE-SLE-Live-Patching-12-SP3-2018-1680,SUSE-SLE-Live-Patching-12-SP3-2018-1681
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.132-94_33 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).\n- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn\u0027t propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-1678,SUSE-SLE-Live-Patching-12-SP3-2018-1679,SUSE-SLE-Live-Patching-12-SP3-2018-1680,SUSE-SLE-Live-Patching-12-SP3-2018-1681", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2414-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2414-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182414-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2414-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004469.html" }, { "category": "self", "summary": "SUSE Bug 1097108", "url": "https://bugzilla.suse.com/1097108" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-08-17T14:58:18Z", "generator": { "date": "2018-08-17T14:58:18Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2414-1", "initial_release_date": "2018-08-17T14:58:18Z", "revision_history": [ { "date": "2018-08-17T14:58:18Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_120-94_17-default-5-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_120-94_17-default-5-2.1.ppc64le", "product_id": "kgraft-patch-4_4_120-94_17-default-5-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_126-94_22-default-5-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_126-94_22-default-5-2.1.ppc64le", "product_id": "kgraft-patch-4_4_126-94_22-default-5-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_131-94_29-default-3-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_131-94_29-default-3-2.1.ppc64le", "product_id": "kgraft-patch-4_4_131-94_29-default-3-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_132-94_33-default-3-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_132-94_33-default-3-2.1.ppc64le", "product_id": "kgraft-patch-4_4_132-94_33-default-3-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_120-94_17-default-5-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_120-94_17-default-5-2.1.x86_64", "product_id": "kgraft-patch-4_4_120-94_17-default-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_126-94_22-default-5-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_126-94_22-default-5-2.1.x86_64", "product_id": "kgraft-patch-4_4_126-94_22-default-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_131-94_29-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_131-94_29-default-3-2.1.x86_64", "product_id": "kgraft-patch-4_4_131-94_29-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_132-94_33-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_132-94_33-default-3-2.1.x86_64", "product_id": "kgraft-patch-4_4_132-94_33-default-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-94_17-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-5-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_120-94_17-default-5-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-94_17-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_120-94_17-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_126-94_22-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-5-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_126-94_22-default-5-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_126-94_22-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_126-94_22-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_131-94_29-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_131-94_29-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_131-94_29-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_131-94_29-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_132-94_33-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_132-94_33-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_132-94_33-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_132-94_33-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-94_17-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-5-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_120-94_17-default-5-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-94_17-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_120-94_17-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_126-94_22-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-5-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_126-94_22-default-5-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_126-94_22-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_126-94_22-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_131-94_29-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_131-94_29-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_131-94_29-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_131-94_29-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_132-94_33-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_132-94_33-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_132-94_33-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_132-94_33-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-94_17-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-5-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_120-94_17-default-5-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-94_17-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_120-94_17-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_126-94_22-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-5-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_126-94_22-default-5-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_126-94_22-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_126-94_22-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_131-94_29-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_131-94_29-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_131-94_29-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_131-94_29-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_132-94_33-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_132-94_33-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_132-94_33-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_132-94_33-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-94_17-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-5-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_120-94_17-default-5-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-94_17-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_120-94_17-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_126-94_22-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-5-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_126-94_22-default-5-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_126-94_22-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_126-94_22-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_131-94_29-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_131-94_29-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_131-94_29-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_131-94_29-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_132-94_33-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_132-94_33-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_132-94_33-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_132-94_33-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-17T14:58:18Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-5-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_126-94_22-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_132-94_33-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-17T14:58:18Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2389-1
Vulnerability from csaf_suse
Published
2018-08-16 15:59
Modified
2018-08-16 15:59
Summary
Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP2)
Description of the patch
This update for the Linux Kernel 4.4.121-92_85 fixes several issues.
The following security issues were fixed:
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
Patchnames
SUSE-SLE-SAP-12-SP2-2018-1645,SUSE-SLE-SAP-12-SP2-2018-1646,SUSE-SLE-SAP-12-SP2-2018-1647,SUSE-SLE-SAP-12-SP2-2018-1648,SUSE-SLE-SERVER-12-SP2-2018-1645,SUSE-SLE-SERVER-12-SP2-2018-1646,SUSE-SLE-SERVER-12-SP2-2018-1647,SUSE-SLE-SERVER-12-SP2-2018-1648
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.121-92_85 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).\n- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn\u0027t propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-1645,SUSE-SLE-SAP-12-SP2-2018-1646,SUSE-SLE-SAP-12-SP2-2018-1647,SUSE-SLE-SAP-12-SP2-2018-1648,SUSE-SLE-SERVER-12-SP2-2018-1645,SUSE-SLE-SERVER-12-SP2-2018-1646,SUSE-SLE-SERVER-12-SP2-2018-1647,SUSE-SLE-SERVER-12-SP2-2018-1648", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2389-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2389-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182389-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2389-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004457.html" }, { "category": "self", "summary": "SUSE Bug 1097108", "url": "https://bugzilla.suse.com/1097108" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-08-16T15:59:53Z", "generator": { "date": "2018-08-16T15:59:53Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2389-1", "initial_release_date": "2018-08-16T15:59:53Z", "revision_history": [ { "date": "2018-08-16T15:59:53Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64", "product_id": "kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64", "product_id": "kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64", "product_id": "kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64", "product_id": "kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T15:59:53Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_80-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T15:59:53Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2450-1
Vulnerability from csaf_suse
Published
2018-08-20 08:36
Modified
2018-08-20 08:36
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-5391: A remote attacker even with relatively low bandwidth could
have caused lots of CPU usage by triggering the worst case scenario during
fragment reassembly (bsc#1103097)
- CVE-2018-3620, CVE-2018-3646: Local attackers in virtualized guest systems
could use speculative code patterns on hyperthreaded processors to read data
present in the L1 Datacache used by other hyperthreads on the same CPU core,
potentially leaking sensitive data, even from other virtual machines or the
host system. (bnc#1089343, bsc#1087081).
- CVE-2018-10882: A local user could have caused an out-of-bound write, leading
to denial of service and a system crash by unmounting a crafted ext4 filesystem
image (bsc#1099849).
- CVE-2018-10880: Prevent a stack-out-of-bounds write in the ext4 filesystem
code when mounting and writing crafted ext4 images. An attacker could have used
this to cause a system crash and a denial of service (bsc#1099845).
- CVE-2018-10881: A local user could have caused an out-of-bound access and a
system crash by mounting and operating on a crafted ext4 filesystem image
(bsc#1099864).
- CVE-2018-10877: Prevent an out-of-bound access in the ext4_ext_drop_refs()
function when operating on a crafted ext4 filesystem image (bsc#1099846).
- CVE-2018-10876: Prevent use-after-free in ext4_ext_remove_space() function
when mounting and operating a crafted ext4 image (bsc#1099811).
- CVE-2018-10878: A local user could have caused an out-of-bounds write and a
denial of service by mounting and operating a crafted ext4 filesystem image
(bsc#1099813).
- CVE-2018-10883: A local user could have caused an out-of-bounds write in
jbd2_journal_dirty_metadata(), a denial of service, and a system crash by
mounting and operating on a crafted ext4 filesystem image (bsc#1099863).
- CVE-2018-10879: A local user could have caused a use-after-free in
ext4_xattr_set_entry function and a denial of service or unspecified other
impact may occur by renaming a file in a crafted ext4 filesystem image
(bsc#1099844).
- CVE-2018-10853: A flaw was found in Linux Kernel KVM. In which certain
instructions such as sgdt/sidt call segmented_write_std doesn't propagate
access correctly. As such, during userspace induced exception, the
guest can incorrectly assume that the exception happened in the kernel
and panic. (bnc#1097104).
The following non-security bugs were fixed:
- apci / lpss: Only call pwm_add_table() for Bay Trail PWM if PMIC HRV is 2 (bsc#1051510).
- acpi / pci: Bail early in acpi_pci_add_bus() if there is no ACPI handle (bsc#1051510).
- af_key: Always verify length of provided sadb_key (bsc#1051510).
- af_key: fix buffer overread in parse_exthdrs() (bsc#1051510).
- af_key: fix buffer overread in verify_address_len() (bsc#1051510).
- afs: Fix directory permissions check (bsc#1101828).
- agp: uninorth: make two functions static (bsc#1051510).
- alsa: emu10k1: add error handling for snd_ctl_add (bsc#1051510).
- alsa: emu10k1: Rate-limit error messages about page errors (bsc#1051510).
- alsa: fm801: add error handling for snd_ctl_add (bsc#1051510).
- alsa: snd-aoa: add of_node_put() in error path (bsc#1051510).
- alsa: usb-audio: Apply rate limit to warning messages in URB complete callback (bsc#1051510).
- arm64: Correct type for PUD macros (bsc#1103723).
- arm64: Disable unhandled signal log messages by default (bsc#1103724).
- arm64: KVM: fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1103725).
- arm64: mm: Fix set_memory_valid() declaration (bsc#1103726).
- arm64: perf: correct PMUVer probing (bsc#1103727).
- arm64: ptrace: Avoid setting compat FPR to garbage if get_user fails (bsc#1103728).
- arm64: spinlock: Fix theoretical trylock() A-B-A with LSE atomics (bsc#1103729).
- arm64: vdso: fix clock_getres for 4GiB-aligned res (bsc#1103730).
- arm: 8715/1: add a private asm/unaligned.h (bsc#1051510).
- arm: 8720/1: ensure dump_instr() checks addr_limit (bsc#1051510).
- arm: 8721/1: mm: dump: check hardware RO bit for LPAE (bsc#1051510).
- arm: 8722/1: mm: make STRICT_KERNEL_RWX effective for LPAE (bsc#1051510).
- arm: 8731/1: Fix csum_partial_copy_from_user() stack mismatch (bsc#1051510).
- arm: 8743/1: bL_switcher: add MODULE_LICENSE tag (bsc#1051510).
- arm: 8746/1: vfp: Go back to clearing vfp_current_hw_state[] (bsc#1051510).
- arm: 8748/1: mm: Define vdso_start, vdso_end as array (bsc#1051510).
- arm: 8753/1: decompressor: add a missing parameter to the addruart macro (bsc#1051510).
- arm: 8758/1: decompressor: restore r1 and r2 just before jumping to the kernel (bsc#1051510).
- arm: 8764/1: kgdb: fix NUMREGBYTES so that gdb_regs[] is the correct size (bsc#1051510).
- arm: 8769/1: kprobes: Fix to use get_kprobe_ctlblk after irq-disabed (bsc#1051510).
- arm: 8770/1: kprobes: Prohibit probing on optimized_callback (bsc#1051510).
- arm: 8771/1: kprobes: Prohibit kprobes on do_undefinstr (bsc#1051510).
- arm: 8772/1: kprobes: Prohibit kprobes on get_user functions (bsc#1051510).
- arm: AM33xx: PRM: Remove am33xx_pwrdm_read_prev_pwrst function (bsc#1051510).
- arm: amba: Fix race condition with driver_override (bsc#1051510).
- arm: amba: Fix wrong indentation in driver_override_store() (bsc#1051510).
- arm: amba: Make driver_override output consistent with other buses (bsc#1051510).
- arm: at91: do not select CONFIG_ARM_CPU_SUSPEND for old platforms (bsc#1051510).
- arm: avoid faulting on qemu (bsc#1051510).
- arm: BUG if jumping to usermode address in kernel mode (bsc#1051510).
- arm-ccn: perf: Prevent module unload while PMU is in use (bsc#1051510).
- arm: davinci: Add dma_mask to dm365's eDMA device (bsc#1051510).
- arm: davinci: board-da830-evm: fix GPIO lookup for MMC/SD (bsc#1051510).
- arm: davinci: board-da850-evm: fix GPIO lookup for MMC/SD (bsc#1051510).
- arm: davinci: board-da850-evm: fix WP pin polarity for MMC/SD (bsc#1051510).
- arm: davinci: board-dm355-evm: fix broken networking (bsc#1051510).
- arm: davinci: board-dm646x-evm: pass correct I2C adapter id for VPIF (bsc#1051510).
- arm: davinci: board-dm646x-evm: set VPIF capture card name (bsc#1051510).
- arm: davinci: board-omapl138-hawk: fix GPIO numbers for MMC/SD lookup (bsc#1051510).
- arm: davinci: dm646x: fix timer interrupt generation (bsc#1051510).
- arm: davinci: fix mmc entries in dm365's dma_slave_map (bsc#1051510).
- arm: davinci: fix the GPIO lookup for omapl138-hawk (bsc#1051510).
- arm: davinci: Use platform_device_register_full() to create pdev for dm365's eDMA (bsc#1051510).
- arm: DRA722: remove redundant definition of 1.0 device (bsc#1051510).
- arm: fix return value of parse_cpu_capacity (bsc#1051510).
- arm: kexec: fix failure to boot crash kernel (bsc#1051510).
- arm: kexec: fix kdump register saving on panic() (bsc#1051510).
- arm: keystone: fix platform_domain_notifier array overrun (bsc#1051510).
- arm: kvm: fix building with gcc-8 (bsc#1051510).
- arm: multi_v7_defconfig: Replace DRM_RCAR_HDMI by generic bridge options (bsc#1051510).
- arm: multi_v7_defconfig: Replace SND_SOC_RSRC_CARD by SND_SIMPLE_SCU_CARD (bsc#1051510).
- arm: mvebu: Fix broken PL310_ERRATA_753970 selects (bsc#1051510).
- arm: OMAP1: clock: Fix debugfs_create_*() usage (bsc#1051510).
- arm: OMAP2+: Fix SRAM virt to phys translation for save_secure_ram_context (bsc#1051510).
- arm: omap2: hide omap3_save_secure_ram on non-OMAP3 builds (bsc#1051510).
- arm: OMAP2+: omap_device: drop broken RPM status update from suspend_noirq (bsc#1051510).
- arm: OMAP2+: powerdomain: use raw_smp_processor_id() for trace (bsc#1051510).
- arm: OMAP2+: timer: fix a kmemleak caused in omap_get_timer_dt (bsc#1051510).
- arm: OMAP3: Fix prm wake interrupt for resume (bsc#1051510).
- arm: OMAP3: hwmod_data: add missing module_offs for MMC3 (bsc#1051510).
- arm: OMAP3+: PRM: fix of_irq_get() result check (bsc#1051510).
- arm: OMAP4+: PRM: fix of_irq_get() result checks (bsc#1051510).
- arm: OMAP: Fix dmtimer init for omap1 (bsc#1051510).
- arm: OMAP: Fix SRAM W+X mapping (bsc#1051510).
- arm: orion5x: Revert commit 4904dbda41c8 (bsc#1051510).
- arm: orion: fix orion_ge00_switch_board_info initialization (bsc#1051510).
- arm: pxa: select both FB and FB_W100 for eseries (bsc#1051510).
- arm: pxa/tosa-bt: add MODULE_LICENSE tag (bsc#1051510).
- arm: remove wrong CONFIG_PROC_SYSCTL ifdef (bsc#1051510).
- arm: s3c24xx: Fix NAND ECC mode for mini2440 board (bsc#1051510).
- arm: shmobile: defconfig: Enable missing PCIE_RCAR dependency (bsc#1051510).
- arm: shmobile: defconfig: Replace DRM_RCAR_HDMI by generic bridge options (bsc#1051510).
- arm: shmobile: defconfig: Replace SND_SOC_RSRC_CARD by SND_SIMPLE_SCU_CARD (bsc#1051510).
- arm: shmobile: defconfig: Replace USB_XHCI_RCAR by USB_XHCI_PLATFORM (bsc#1051510).
- arm: shmobile: rcar-gen2: Fix deadlock in regulator quirk (bsc#1051510).
- arm: socfpga_defconfig: Remove QSPI Sector 4K size force (bsc#1051510).
- arm: spear13xx: Fix dmas cells (bsc#1051510).
- arm: sunxi_defconfig: Enable CMA (bsc#1051510).
- arm: sunxi: fix the core number of V3s in sunxi README (bsc#1051510).
- asoc: dpcm: do not merge format from invalid codec dai (bsc#1051510).
- ASoC: dpcm: fix BE dai not hw_free and shutdown (bsc#1051510).
- asoc: es7134: remove 64kHz rate from the supported rates (bsc#1051510).
- asoc: rsnd: cmd: Add missing newline to debug message (bsc#1051510).
- asoc: sirf: Fix potential NULL pointer dereference (bsc#1051510).
- asoc: topology: Add missing clock gating parameter when parsing hw_configs (bsc#1051510).
- asoc: topology: Fix bclk and fsync inversion in set_link_hw_format() (bsc#1051510).
- asoc: zte: Fix incorrect PCM format bit usages (bsc#1051510).
- ata: do not schedule hot plug if it is a sas host ().
- ath: Add regulatory mapping for APL13_WORLD (bsc#1051510).
- ath: Add regulatory mapping for APL2_FCCA (bsc#1051510).
- ath: Add regulatory mapping for Bahamas (bsc#1051510).
- ath: Add regulatory mapping for Bermuda (bsc#1051510).
- ath: Add regulatory mapping for ETSI8_WORLD (bsc#1051510).
- ath: Add regulatory mapping for FCC3_ETSIC (bsc#1051510).
- ath: Add regulatory mapping for Serbia (bsc#1051510).
- ath: Add regulatory mapping for Tanzania (bsc#1051510).
- ath: Add regulatory mapping for Uganda (bsc#1051510).
- audit: fix potential null dereference 'context->module.name' (bsc#1051510).
- backlight: pwm_bl: Do not use GPIOF_* with gpiod_get_direction (bsc#1051510).
- bdi: Move cgroup bdi_writeback to a dedicated low concurrency workqueue (bsc#1101867).
- be2net: gather debug info and reset adapter (only for Lancer) on a tx-timeout (bsc#1086288).
- be2net: Update the driver version to 12.0.0.0 (bsc#1086288 ).
- befs_lookup(): use d_splice_alias() (bsc#1101844).
- block: Fix transfer when chunk sectors exceeds max (bsc#1101874).
- Bluetooth: btusb: Add a new Realtek 8723DE ID 2ff8:b011 (bsc#1051510).
- Bluetooth: btusb: add ID for LiteOn 04ca:301a (bsc#1051510).
- Bluetooth: hci_qca: Fix 'Sleep inside atomic section' warning (bsc#1051510).
- bpf, ppc64: fix unexpected r0=0 exit path inside bpf_xadd (bsc#1083647).
- branch-check: fix long->int truncation when profiling branches (bsc#1101116,).
- brcmfmac: Add support for bcm43364 wireless chipset (bsc#1051510).
- cachefiles: Fix missing clear of the CACHEFILES_OBJECT_ACTIVE flag (bsc#1099858).
- cachefiles: Fix refcounting bug in backing-file read monitoring (bsc#1099858).
- cachefiles: Wait rather than BUG'ing on 'Unexpected object collision' (bsc#1099858).
- can: dev: increase bus-off message severity (bsc#1051510).
- can: ems_usb: Fix memory leak on ems_usb_disconnect() (bsc#1051510).
- can: m_can: change comparison to bitshift when dealing with a mask (bsc#1051510).
- cdrom: do not call check_disk_change() inside cdrom_open() (bsc#1101872).
- clk: at91: fix clk-generated compilation (bsc#1051510).
- clk: renesas: cpg-mssr: Stop using printk format %pCr (bsc#1051510).
- coccinelle: fix parallel build with CHECK=scripts/coccicheck (bsc#1051510).
- compiler.h: enable builtin overflow checkers and add fallback code (bsc#1101116,).
- cpufreq: intel_pstate: Limit the scope of HWP dynamic boost platforms (bsc#1066110).
- cpu/hotplug: Make bringup/teardown of smp threads symmetric (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- crypto: authenc - do not leak pointers to authenc keys (bsc#1051510).
- crypto: authencesn - do not leak pointers to authenc keys (bsc#1051510).
- crypto: padlock-aes - Fix Nano workaround data corruption (bsc#1051510).
- delayacct: fix crash in delayacct_blkio_end() after delayacct init failure (bsc#1104066).
- Delete patches.suse/0201-dax-dm-allow-device-mapper-to-operate-without-dax-su.patch (bsc#1103917).
- disable PINCTRL_LEWISBURG
- dm: add writecache target (bsc#1101116,).
- dm: prevent DAX mounts if not supported (bsc#1103917).
- dm writecache: support optional offset for start of device (bsc#1101116,).
- dm writecache: use 2-factor allocator arguments (bsc#1101116,).
- doc: Add vendor prefix for Kieback and Peter GmbH (bsc#1051510).
- docs: zh_CN: fix location of oops-tracing.txt (bsc#1051510).
- drivers: soc: sunxi: fix error processing on base address when claiming (bsc#1051510).
- drm: Add DP PSR2 sink enable bit (bsc#1051510).
- drm/amdgpu: Remove VRAM from shared bo domains (bsc#1051510).
- drm/atomic: Check old_plane_state->crtc in drm_atomic_helper_async_check() (bsc#1051510).
- drm/atomic: Handling the case when setting old crtc for plane (bsc#1051510).
- drm/atomic-helper: Drop plane->fb references only for drm_atomic_helper_shutdown() (bsc#1051510).
- drm/atomic: Initialize variables in drm_atomic_helper_async_check() to make gcc happy (bsc#1051510).
- drm/atomic: Make async plane update checks work as intended, v2 (bsc#1051510).
- drm/atomic: Make atomic helper track newly assigned planes correctly, v2 (bsc#1051510).
- drm/atomic: Make atomic iterators less surprising (bsc#1051510).
- drm/cirrus: Use drm_framebuffer_put to avoid kernel oops in clean-up (bsc#1101822).
- drm/dp/mst: Fix off-by-one typo when dump payload table (bsc#1051510).
- drm/gma500: fix psb_intel_lvds_mode_valid()'s return type (bsc#1051510).
- drm/nouveau/fifo/gk104-: poll for runlist update completion (bsc#1051510).
- drm/radeon: fix mode_valid's return type (bsc#1051510).
- drm: re-enable error handling (bsc#1051510).
- drm/vc4: Reset ->{x, y}_scaling[1] when dealing with uniplanar formats (bsc#1051510).
- edac: Add missing MEM_LRDDR4 entry in edac_mem_types[] (bsc#1103886).
- edac, altera: Fix ARM64 build warning (bsc#1051510).
- edac: Drop duplicated array of strings for memory type names (bsc#1103886).
- edac, mv64x60: Fix an error handling path (bsc#1051510).
- edac, octeon: Fix an uninitialized variable warning (bsc#1051510).
- edac, sb_edac: Fix missing break in switch (bsc#1051510).
- ext2: fix a block leak (bsc#1101875).
- ext4: add more mount time checks of the superblock (bsc#1101900).
- ext4: bubble errors from ext4_find_inline_data_nolock() up to ext4_iget() (bsc#1101896).
- ext4: check for allocation block validity with block group locked (bsc#1104495).
- ext4: check superblock mapped prior to committing (bsc#1101902).
- ext4: do not update s_last_mounted of a frozen fs (bsc#1101841).
- ext4: factor out helper ext4_sample_last_mounted() (bsc#1101841).
- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).
- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).
- ext4: fix fencepost error in check for inode count overflow during resize (bsc#1101853).
- ext4: fix inline data updates with checksums enabled (bsc#1104494).
- ext4: include the illegal physical block in the bad map ext4_error msg (bsc#1101903).
- ext4: report delalloc reserve as non-free in statfs for project quota (bsc#1101843).
- ext4: update mtime in ext4_punch_hole even if no blocks are released (bsc#1101895).
- f2fs: call unlock_new_inode() before d_instantiate() (bsc#1101837).
- fix io_destroy()/aio_complete() race (bsc#1101852).
- Force log to disk before reading the AGF during a fstrim (bsc#1101893).
- fs: allow per-device dax status checking for filesystems (bsc#1103917).
- fscache: Allow cancelled operations to be enqueued (bsc#1099858).
- fscache: Fix hanging wait on page discarded by writeback (bsc#1101885).
- fscache: Fix reference overput in fscache_attach_object() error handling (bsc#1099858).
- fs: clear writeback errors in inode_init_always (bsc#1101882).
- fs: do not scan the inode cache before SB_BORN is set (bsc#1101883).
- geneve: update skb dst pmtu on tx path (bsc#1051510).
- genirq: Check __free_irq() return value for NULL (bsc#1103517).
- genirq: Fix editing error in a comment (bsc#1051510).
- genirq: Make force irq threading setup more robust (bsc#1051510).
- gtp: Initialize 64-bit per-cpu stats correctly (bsc#1051510).
- HID: hid-plantronics: Re-resend Update to map button for PTT products (bsc#1051510).
- HID: i2c-hid: check if device is there before really probing (bsc#1051510).
- hippi: Fix a Fix a possible sleep-in-atomic bug in rr_close (bsc#1051510).
- hns3: fix unused function warning (bsc#1104353).
- hns3pf: do not check handle during mqprio offload (bsc#1104353 ).
- hns3pf: fix hns3_del_tunnel_port() (bsc#1104353).
- hns3pf: Fix some harmless copy and paste bugs (bsc#1104353 ).
- hv_netvsc: Ensure correct teardown message sequence order ().
- hv/netvsc: fix handling of fallback to single queue mode ().
- hv_netvsc: Fix napi reschedule while receive completion is busy.
- hv_netvsc: Fix net device attach on older Windows hosts ().
- hv/netvsc: Fix NULL dereference at single queue mode fallback (bsc#1104708).
- hv_netvsc: set master device (bsc#1051979).
- hv_netvsc: Split netvsc_revoke_buf() and netvsc_teardown_gpadl() ().
- hv_netvsc: split sub-channel setup into async and sync ().
- hv_netvsc: Use Windows version instead of NVSP version on GPAD teardown ().
- hwmon: (asus_atk0110) Replace deprecated device register call (bsc#1103363).
- i2c: imx: Fix reinit_completion() use (bsc#1051510).
- IB/hns: Annotate iomem pointers correctly (bsc#1104427 ).
- IB/hns: Avoid compile test under non 64bit environments (bsc#1104427).
- IB/hns: Declare local functions 'static' (bsc#1104427 ).
- IB/hns: fix boolreturn.cocci warnings (bsc#1104427).
- IB/hns: Fix for checkpatch.pl comment style warnings (bsc#1104427).
- IB/hns: fix memory leak on ah on error return path (bsc#1104427 ).
- IB/hns: fix returnvar.cocci warnings (bsc#1104427).
- IB/hns: fix semicolon.cocci warnings (bsc#1104427).
- IB/hns: Fix the bug of polling cq failed for loopback Qps (bsc#1104427).
- IB/hns: Fix the bug with modifying the MAC address without removing the driver (bsc#1104427).
- IB/hns: Fix the bug with rdma operation (bsc#1104427 ).
- IB/hns: Fix the bug with wild pointer when destroy rc qp (bsc#1104427).
- IB/hns: include linux/interrupt.h (bsc#1104427).
- IB/hns: Support compile test for hns RoCE driver (bsc#1104427 ).
- IB/hns: Use zeroing memory allocator instead of allocator/memset (bsc#1104427).
- ibmasm: do not write out of bounds in read handler (bsc#1051510).
- ibmvnic: Remove code to request error information (bsc#1104174).
- ibmvnic: Revise RX/TX queue error messages (bsc#1101331).
- ibmvnic: Update firmware error reporting with cause string (bsc#1104174).
- init: rename and re-order boot_cpu_state_init() (bsc#1104365).
- Input: elan_i2c - add ACPI ID for lenovo ideapad 330 (bsc#1051510).
- Input: elan_i2c - add another ACPI ID for Lenovo Ideapad 330-15AST (bsc#1051510).
- Input: i8042 - add Lenovo LaVie Z to the i8042 reset list (bsc#1051510).
- irqchip: brcmstb-l2: Define an irq_pm_shutdown function (bsc#1051510).
- irqchip/gic: Take lock when updating irq type (bsc#1051510).
- irqchip/gic-v3: Change pr_debug message to pr_devel (bsc#1051510).
- irqchip/gic-v3: Fix the driver probe() fail due to disabled GICC entry (bsc#1051510).
- irqchip/gic-v3: Ignore disabled ITS nodes (bsc#1051510).
- irqchip/gic-v3: Use wmb() instead of smb_wmb() in gic_raise_softirq() (bsc#1051510).
- irqchip/qcom: Fix check for spurious interrupts (bsc#1051510).
- irqchip/qcom: Fix u32 comparison with value less than zero (bsc#1051510).
- isofs: fix potential memory leak in mount option parsing (bsc#1101887).
- iwlwifi: add more card IDs for 9000 series (bsc#1051510).
- iwlwifi: pcie: fix race in Rx buffer allocator (bsc#1051510).
- jump_label: Fix concurrent static_key_enable/disable() (bsc#1089343).
- jump_label: Provide hotplug context variants (bsc#1089343).
- jump_label: Reorder hotplug lock and jump_label_lock (bsc#1089343).
- kabi protect bdev_dax_supported (bsc#1103917).
- kabi protect struct ccw_device_private (bsc#1103421).
- KABI protect structy ata_host (git-fixes).
- kabi/severities: Allow kABI changes for kvm/x86 (except for kvm_x86_ops)
- kabi/severities: do not complain on hisi_sas internal changes ().
- kabi/severities: ignore qla2xxx as all symbols are internal
- kabi/severities: ignore x86_kvm_ops; lttng-modules would have to be adjusted in case they depend on this particular change
- kbuild: add '-fno-stack-check' to kernel build options (bsc#1051510).
- kbuild: Handle builtin dtb file names containing hyphens (bsc#1051510).
- kbuild: pkg: use --transform option to prefix paths in tar (bsc#1051510).
- kconfig: display recursive dependency resolution hint just once (bsc#1051510).
- kmemleak: add scheduling point to kmemleak_scan() (bsc#1051510).
- kthread, tracing: Do not expose half-written comm when creating kthreads (bsc#1104897).
- KVM: SVM: Add pause filter threshold ().
- KVM: SVM: Implement pause loop exit logic in SVM ().
- KVM: VMX: Bring the common code to header file ().
- KVM: VMX: Fix the module parameters for vmx ().
- KVM: VMX: Remove ple_window_actual_max ().
- libata: add refcounting to ata_host (git-fixes).
- libata: ensure host is free'd on error exit paths (git-fixes).
- libnvdimm, dimm: fix dpa reservation vs uninitialized label area (git-fixes).
- linvdimm, pmem: Preserve read-only setting for pmem devices (git-fixes).
- MAINTAINERS: review Renesas DT bindings as well (bsc#1051510).
- media: media-device: fix ioctl function types (bsc#1051510).
- media: omap3isp: fix unbalanced dma_iommu_mapping (bsc#1051510).
- media: rcar_jpu: Add missing clk_disable_unprepare() on error in jpu_open() (bsc#1051510).
- media: rc: oops in ir_timer_keyup after device unplug (bsc#1090888).
- media: saa7164: Fix driver name in debug output (bsc#1051510).
- media: si470x: fix __be16 annotations (bsc#1051510).
- media: siano: get rid of __le32/__le16 cast warnings (bsc#1051510).
- media: tw686x: Fix incorrect vb2_mem_ops GFP flags (bsc#1051510).
- media: videobuf2-core: do not call memop 'finish' when queueing (bsc#1051510).
- mfd: cros_ec: Fail early if we cannot identify the EC (bsc#1051510).
- mfd: fsl-imx25: Clean up irq settings during removal (bsc#1051510).
- mfd: mxs-lradc: Fix error handling in mxs_lradc_probe() (bsc#1051510).
- misc: pci_endpoint_test: Avoid triggering a BUG() (bsc#1051510).
- mmc: dw_mmc: update actual clock for mmc debugfs (bsc#1051510).
- mmc: pwrseq: Use kmalloc_array instead of stack VLA (bsc#1051510).
- mm: fix __gup_device_huge vs unmap (bsc#1101839).
- mm/kmemleak.c: make cond_resched() rate-limiting more efficient (bsc#1051510).
- mwifiex: correct histogram data with appropriate index (bsc#1051510).
- mwifiex: handle race during mwifiex_usb_disconnect (bsc#1051510).
- net: hns3: Add a check for client instance init state (bsc#1104353).
- net: hns3: add a mask initialization for mac_vlan table (bsc#1104353).
- net: hns3: Add *Asserting Reset* mailbox message and handling in VF (bsc#1104353).
- net: hns3: add Asym Pause support to phy default features (bsc#1104353).
- net: hns3: Add dcb netlink interface for the support of DCB feature (bsc#1104353).
- net: hns3: Add DCB support when interacting with network stack (bsc#1104353).
- net: hns3: Add ethtool interface for vlan filter (bsc#1104353 ).
- net: hns3: add ethtool_ops.get_channels support for VF (bsc#1104353).
- net: hns3: add ethtool_ops.get_coalesce support to PF (bsc#1104353).
- net: hns3: add ethtool_ops.set_coalesce support to PF (bsc#1104353).
- net: hns3: add ethtool -p support for fiber port (bsc#1104353 ).
- net: hns3: add ethtool related offload command (bsc#1104353 ).
- net: hns3: Add Ethtool support to HNS3 driver (bsc#1104353 ).
- net: hns3: add existence checking before adding unicast mac address (bsc#1104353).
- net: hns3: add existence check when remove old uc mac address (bsc#1104353).
- net: hns3: add feature check when feature changed (bsc#1104353 ).
- net: hns3: add get_link support to VF (bsc#1104353).
- net: hns3: add get/set_coalesce support to VF (bsc#1104353 ).
- net: hns3: add handling vlan tag offload in bd (bsc#1104353 ).
- net: hns3: Add hclge_dcb module for the support of DCB feature (bsc#1104353).
- net: hns3: Add HNS3 Acceleration Engine and Compatibility Layer Support (bsc#1104353).
- net: hns3: Add HNS3 driver to kernel build framework and MAINTAINERS (bsc#1104353).
- net: hns3: Add hns3_get_handle macro in hns3 driver (bsc#1104353 ).
- net: hns3: Add HNS3 IMP(Integrated Mgmt Proc) Cmd Interface Support (bsc#1104353).
- net: hns3: Add HNS3 VF driver to kernel build framework (bsc#1104353).
- net: hns3: Add HNS3 VF HCL(Hardware Compatibility Layer) Support (bsc#1104353).
- net: hns3: Add HNS3 VF IMP(Integrated Management Proc) cmd interface (bsc#1104353).
- net: hns3: add int_gl_idx setup for TX and RX queues (bsc#1104353).
- net: hns3: add int_gl_idx setup for VF (bsc#1104353 ).
- net: hns3: Add mac loopback selftest support in hns3 driver (bsc#1104353).
- net: hns3: Add mailbox interrupt handling to PF driver (bsc#1104353).
- net: hns3: Add mailbox support to PF driver (bsc#1104353 ).
- net: hns3: Add mailbox support to VF driver (bsc#1104353 ).
- net: hns3: add manager table initialization for hardware (bsc#1104353).
- net: hns3: Add MDIO support to HNS3 Ethernet driver for hip08 SoC (bsc#1104353).
- net: hns3: Add missing break in misc_irq_handle (bsc#1104353 ).
- net: hns3: Add more packet size statisctics (bsc#1104353 ).
- net: hns3: add MTU initialization for hardware (bsc#1104353 ).
- net: hns3: add net status led support for fiber port (bsc#1104353).
- net: hns3: add nic_client check when initialize roce base information (bsc#1104353).
- net: hns3: add querying speed and duplex support to VF (bsc#1104353).
- net: hns3: Add repeat address checking for setting mac address (bsc#1104353).
- net: hns3: Add reset interface implementation in client (bsc#1104353).
- net: hns3: Add reset process in hclge_main (bsc#1104353 ).
- net: hns3: Add reset service task for handling reset requests (bsc#1104353).
- net: hns3: add result checking for VF when modify unicast mac address (bsc#1104353).
- net: hns3: Add some interface for the support of DCB feature (bsc#1104353).
- net: hns3: Adds support for led locate command for copper port (bsc#1104353).
- net: hns3: Add STRP_TAGP field support for hardware revision 0x21 (bsc#1104353).
- net: hns3: Add support for dynamically buffer reallocation (bsc#1104353).
- net: hns3: add support for ETHTOOL_GRXFH (bsc#1104353 ).
- net: hns3: add support for get_regs (bsc#1104353).
- net: hns3: Add support for IFF_ALLMULTI flag (bsc#1104353 ).
- net: hns3: Add support for misc interrupt (bsc#1104353 ).
- net: hns3: add support for nway_reset (bsc#1104353).
- net: hns3: Add support for PFC setting in TM module (bsc#1104353 ).
- net: hns3: Add support for port shaper setting in TM module (bsc#1104353).
- net: hns3: add support for querying advertised pause frame by ethtool ethx (bsc#1104353).
- net: hns3: add support for querying pfc puase packets statistic (bsc#1104353).
- net: hns3: add support for set_link_ksettings (bsc#1104353 ).
- net: hns3: add support for set_pauseparam (bsc#1104353 ).
- net: hns3: add support for set_ringparam (bsc#1104353 ).
- net: hns3: add support for set_rxnfc (bsc#1104353).
- net: hns3: Add support for tx_accept_tag2 and tx_accept_untag2 config (bsc#1104353).
- net: hns3: add support for VF driver inner interface hclgevf_ops.get_tqps_and_rss_info (bsc#1104353).
- net: hns3: Add support of hardware rx-vlan-offload to HNS3 VF driver (bsc#1104353).
- net: hns3: Add support of HNS3 Ethernet Driver for hip08 SoC (bsc#1104353).
- net: hns3: Add support of .sriov_configure in HNS3 driver (bsc#1104353).
- net: hns3: Add support of the HNAE3 framework (bsc#1104353 ).
- net: hns3: Add support of TX Scheduler and Shaper to HNS3 driver (bsc#1104353).
- net: hns3: Add support to change MTU in HNS3 hardware (bsc#1104353).
- net: hns3: Add support to enable TX/RX promisc mode for H/W rev(0x21) (bsc#1104353).
- net: hns3: add support to modify tqps number (bsc#1104353 ).
- net: hns3: add support to query tqps number (bsc#1104353 ).
- net: hns3: Add support to re-initialize the hclge device (bsc#1104353).
- net: hns3: Add support to request VF Reset to PF (bsc#1104353 ).
- net: hns3: Add support to reset the enet/ring mgmt layer (bsc#1104353).
- net: hns3: add support to update flow control settings after autoneg (bsc#1104353).
- net: hns3: Add tc-based TM support for sriov enabled port (bsc#1104353).
- net: hns3: Add timeout process in hns3_enet (bsc#1104353 ).
- net: hns3: Add VF Reset device state and its handling (bsc#1104353).
- net: hns3: Add VF Reset Service Task to support event handling (bsc#1104353).
- net: hns3: add vlan offload config command (bsc#1104353 ).
- net: hns3: change GL update rate (bsc#1104353).
- net: hns3: Change PF to add ring-vect binding and resetQ to mailbox (bsc#1104353).
- net: hns3: Change return type of hnae3_register_ae_algo (bsc#1104353).
- net: hns3: Change return type of hnae3_register_ae_dev (bsc#1104353).
- net: hns3: Change return value in hnae3_register_client (bsc#1104353).
- net: hns3: Changes required in PF mailbox to support VF reset (bsc#1104353).
- net: hns3: Changes to make enet watchdog timeout func common for PF/VF (bsc#1104353).
- net: hns3: Changes to support ARQ(Asynchronous Receive Queue) (bsc#1104353).
- net: hns3: change the returned tqp number by ethtool -x (bsc#1104353).
- net: hns3: change the time interval of int_gl calculating (bsc#1104353).
- net: hns3: change the unit of GL value macro (bsc#1104353 ).
- net: hns3: change TM sched mode to TC-based mode when SRIOV enabled (bsc#1104353).
- net: hns3: check for NULL function pointer in hns3_nic_set_features (bsc#1104353).
- net: hns3: Cleanup for endian issue in hns3 driver (bsc#1104353 ).
- net: hns3: Cleanup for non-static function in hns3 driver (bsc#1104353).
- net: hns3: Cleanup for ROCE capability flag in ae_dev (bsc#1104353).
- net: hns3: Cleanup for shifting true in hns3 driver (bsc#1104353 ).
- net: hns3: Cleanup for struct that used to send cmd to firmware (bsc#1104353).
- net: hns3: Cleanup indentation for Kconfig in the the hisilicon folder (bsc#1104353).
- net: hns3: cleanup mac auto-negotiation state query (bsc#1104353 ).
- net: hns3: cleanup mac auto-negotiation state query in hclge_update_speed_duplex (bsc#1104353).
- net: hns3: cleanup of return values in hclge_init_client_instance() (bsc#1104353).
- net: hns3: Clear TX/RX rings when stopping port and un-initializing client (bsc#1104353).
- net: hns3: Consistently using GENMASK in hns3 driver (bsc#1104353).
- net: hns3: converting spaces into tabs to avoid checkpatch.pl warning (bsc#1104353).
- net: hns3: Disable VFs change rxvlan offload status (bsc#1104353 ).
- net: hns3: Disable vf vlan filter when vf vlan table is full (bsc#1104353).
- net: hns3: ensure media_type is unitialized (bsc#1104353 ).
- net: hns3: export pci table of hclge and hclgevf to userspace (bsc#1104353).
- net: hns3: fix a bug about hns3_clean_tx_ring (bsc#1104353 ).
- net: hns3: fix a bug for phy supported feature initialization (bsc#1104353).
- net: hns3: fix a bug in hclge_uninit_client_instance (bsc#1104353).
- net: hns3: fix a bug in hns3_driv_to_eth_caps (bsc#1104353 ).
- net: hns3: fix a bug when alloc new buffer (bsc#1104353 ).
- net: hns3: fix a bug when getting phy address from NCL_config file (bsc#1104353).
- net: hns3: fix a dead loop in hclge_cmd_csq_clean (bsc#1104353 ).
- net: hns3: fix a handful of spelling mistakes (bsc#1104353 ).
- net: hns3: Fix a loop index error of tqp statistics query (bsc#1104353).
- net: hns3: Fix a misuse to devm_free_irq (bsc#1104353 ).
- net: hns3: Fix an error handling path in 'hclge_rss_init_hw()' (bsc#1104353).
- net: hns3: Fix an error macro definition of HNS3_TQP_STAT (bsc#1104353).
- net: hns3: Fix an error of total drop packet statistics (bsc#1104353).
- net: hns3: Fix a response data read error of tqp statistics query (bsc#1104353).
- net: hns3: fix endian issue when PF get mbx message flag (bsc#1104353).
- net: hns3: fix error type definition of return value (bsc#1104353).
- net: hns3: Fixes API to fetch ethernet header length with kernel default (bsc#1104353).
- net: hns3: Fixes error reported by Kbuild and internal review (bsc#1104353).
- net: hns3: Fixes initalization of RoCE handle and makes it conditional (bsc#1104353).
- net: hns3: Fixes initialization of phy address from firmware (bsc#1104353).
- net: hns3: Fixes kernel panic issue during rmmod hns3 driver (bsc#1104353).
- net: hns3: Fixes ring-to-vector map-and-unmap command (bsc#1104353).
- net: hns3: Fixes the back pressure setting when sriov is enabled (bsc#1104353).
- net: hns3: Fixes the command used to unmap ring from vector (bsc#1104353).
- net: hns3: Fixes the default VLAN-id of PF (bsc#1104353 ).
- net: hns3: Fixes the error legs in hclge_init_ae_dev function (bsc#1104353).
- net: hns3: Fixes the ether address copy with appropriate API (bsc#1104353).
- net: hns3: Fixes the initialization of MAC address in hardware (bsc#1104353).
- net: hns3: Fixes the init of the VALID BD info in the descriptor (bsc#1104353).
- net: hns3: Fixes the missing PCI iounmap for various legs (bsc#1104353).
- net: hns3: Fixes the missing u64_stats_fetch_begin_irq in 64-bit stats fetch (bsc#1104353).
- net: hns3: Fixes the out of bounds access in hclge_map_tqp (bsc#1104353).
- net: hns3: Fixes the premature exit of loop when matching clients (bsc#1104353).
- net: hns3: fixes the ring index in hns3_fini_ring (bsc#1104353 ).
- net: hns3: Fixes the state to indicate client-type initialization (bsc#1104353).
- net: hns3: Fixes the static checker error warning in hns3_get_link_ksettings() (bsc#1104353).
- net: hns3: Fixes the static check warning due to missing unsupp L3 proto check (bsc#1104353).
- net: hns3: Fixes the wrong IS_ERR check on the returned phydev value (bsc#1104353).
- net: hns3: fix for buffer overflow smatch warning (bsc#1104353 ).
- net: hns3: fix for changing MTU (bsc#1104353).
- net: hns3: fix for cleaning ring problem (bsc#1104353 ).
- net: hns3: Fix for CMDQ and Misc. interrupt init order problem (bsc#1104353).
- net: hns3: fix for coal configuation lost when setting the channel (bsc#1104353).
- net: hns3: fix for coalesce configuration lost during reset (bsc#1104353).
- net: hns3: Fix for deadlock problem occurring when unregistering ae_algo (bsc#1104353).
- net: hns3: Fix for DEFAULT_DV when dev does not support DCB (bsc#1104353).
- net: hns3: Fix for fiber link up problem (bsc#1104353 ).
- net: hns3: fix for getting advertised_caps in hns3_get_link_ksettings (bsc#1104353).
- net: hns3: fix for getting autoneg in hns3_get_link_ksettings (bsc#1104353).
- net: hns3: fix for getting auto-negotiation state in hclge_get_autoneg (bsc#1104353).
- net: hns3: fix for getting wrong link mode problem (bsc#1104353 ).
- net: hns3: Fix for hclge_reset running repeatly problem (bsc#1104353).
- net: hns3: Fix for hns3 module is loaded multiple times problem (bsc#1104353).
- net: hns3: fix for ipv6 address loss problem after setting channels (bsc#1104353).
- net: hns3: fix for loopback failure when vlan filter is enable (bsc#1104353).
- net: hns3: fix for netdev not running problem after calling net_stop and net_open (bsc#1104353).
- net: hns3: Fix for netdev not running problem after calling net_stop and net_open (bsc#1104353).
- net: hns3: fix for not initializing VF rss_hash_key problem (bsc#1104353).
- net: hns3: fix for not returning problem in get_link_ksettings when phy exists (bsc#1104353).
- net: hns3: fix for not setting pause parameters (bsc#1104353 ).
- net: hns3: Fix for not setting rx private buffer size to zero (bsc#1104353).
- net: hns3: Fix for packet loss due wrong filter config in VLAN tbls (bsc#1104353).
- net: hns3: fix for pause configuration lost during reset (bsc#1104353).
- net: hns3: Fix for PF mailbox receving unknown message (bsc#1104353).
- net: hns3: fix for phy_addr error in hclge_mac_mdio_config (bsc#1104353).
- net: hns3: Fix for phy not link up problem after resetting (bsc#1104353).
- net: hns3: Fix for pri to tc mapping in TM (bsc#1104353 ).
- net: hns3: fix for returning wrong value problem in hns3_get_rss_indir_size (bsc#1104353).
- net: hns3: fix for returning wrong value problem in hns3_get_rss_key_size (bsc#1104353).
- net: hns3: fix for RSS configuration loss problem during reset (bsc#1104353).
- net: hns3: Fix for rx priv buf allocation when DCB is not supported (bsc#1104353).
- net: hns3: Fix for rx_priv_buf_alloc not setting rx shared buffer (bsc#1104353).
- net: hns3: Fix for service_task not running problem after resetting (bsc#1104353).
- net: hns3: Fix for setting mac address when resetting (bsc#1104353).
- net: hns3: fix for setting MTU (bsc#1104353).
- net: hns3: Fix for setting rss_size incorrectly (bsc#1104353 ).
- net: hns3: Fix for the null pointer problem occurring when initializing ae_dev failed (bsc#1104353).
- net: hns3: fix for the wrong shift problem in hns3_set_txbd_baseinfo (bsc#1104353).
- net: hns3: fix for updating fc_mode_last_time (bsc#1104353 ).
- net: hns3: fix for use-after-free when setting ring parameter (bsc#1104353).
- net: hns3: Fix for VF mailbox cannot receiving PF response (bsc#1104353).
- net: hns3: Fix for VF mailbox receiving unknown message (bsc#1104353).
- net: hns3: fix for vlan table lost problem when resetting (bsc#1104353).
- net: hns3: Fix for vxlan tx checksum bug (bsc#1104353 ).
- net: hns3: Fix initialization when cmd is not supported (bsc#1104353).
- net: hns3: fix length overflow when CONFIG_ARM64_64K_PAGES (bsc#1104353).
- net: hns3: fix null pointer dereference before null check (bsc#1104353).
- net: hns3: fix return value error of hclge_get_mac_vlan_cmd_status() (bsc#1104353).
- net: hns3: fix rx path skb->truesize reporting bug (bsc#1104353 ).
- net: hns3: Fix setting mac address error (bsc#1104353 ).
- net: hns3: Fix spelling errors (bsc#1104353).
- net: hns3: fix spelling mistake: 'capabilty' -> 'capability' (bsc#1104353).
- net: hns3: fix the bug of hns3_set_txbd_baseinfo (bsc#1104353 ).
- net: hns3: fix the bug when map buffer fail (bsc#1104353 ).
- net: hns3: fix the bug when reuse command description in hclge_add_mac_vlan_tbl (bsc#1104353).
- net: hns3: Fix the missing client list node initialization (bsc#1104353).
- net: hns3: fix the ops check in hns3_get_rxnfc (bsc#1104353 ).
- net: hns3: fix the queue id for tqp enable and reset (bsc#1104353 ).
- net: hns3: fix the ring count for ETHTOOL_GRXRINGS (bsc#1104353 ).
- net: hns3: fix the TX/RX ring.queue_index in hns3_ring_get_cfg (bsc#1104353).
- net: hns3: fix the VF queue reset flow error (bsc#1104353 ).
- net: hns3: fix to correctly fetch l4 protocol outer header (bsc#1104353).
- net: hns3: Fix to support autoneg only for port attached with phy (bsc#1104353).
- net: hns3: Fix typo error for feild in hclge_tm (bsc#1104353 ).
- net: hns3: free the ring_data structrue when change tqps (bsc#1104353).
- net: hns3: get rss_size_max from configuration but not hardcode (bsc#1104353).
- net: hns3: get vf count by pci_sriov_get_totalvfs (bsc#1104353 ).
- net: hns3: hclge_inform_reset_assert_to_vf() can be static (bsc#1104353).
- net: hns3: hns3:fix a bug about statistic counter in reset process (bsc#1104353).
- net: hns3: hns3_get_channels() can be static (bsc#1104353 ).
- net: hns3: Increase the default depth of bucket for TM shaper (bsc#1104353).
- net: hns3: increase the max time for IMP handle command (bsc#1104353).
- net: hns3: make local functions static (bsc#1104353 ).
- net: hns3: Mask the packet statistics query when NIC is down (bsc#1104353).
- net: hns3: Modify the update period of packet statistics (bsc#1104353).
- net: hns3: never send command queue message to IMP when reset (bsc#1104353).
- net: hns3: Optimize PF CMDQ interrupt switching process (bsc#1104353).
- net: hns3: Optimize the PF's process of updating multicast MAC (bsc#1104353).
- net: hns3: Optimize the VF's process of updating multicast MAC (bsc#1104353).
- net: hns3: reallocate tx/rx buffer after changing mtu (bsc#1104353).
- net: hns3: refactor GL update function (bsc#1104353 ).
- net: hns3: refactor interrupt coalescing init function (bsc#1104353).
- net: hns3: Refactor mac_init function (bsc#1104353).
- net: hns3: Refactor of the reset interrupt handling logic (bsc#1104353).
- net: hns3: Refactors the requested reset and pending reset handling code (bsc#1104353).
- net: hns3: refactor the coalesce related struct (bsc#1104353 ).
- net: hns3: refactor the get/put_vector function (bsc#1104353 ).
- net: hns3: refactor the hclge_get/set_rss function (bsc#1104353 ).
- net: hns3: refactor the hclge_get/set_rss_tuple function (bsc#1104353).
- net: hns3: Refactor the initialization of command queue (bsc#1104353).
- net: hns3: refactor the loopback related function (bsc#1104353 ).
- net: hns3: Refactor the mapping of tqp to vport (bsc#1104353 ).
- net: hns3: Refactor the skb receiving and transmitting function (bsc#1104353).
- net: hns3: remove a couple of redundant assignments (bsc#1104353 ).
- net: hns3: remove add/del_tunnel_udp in hns3_enet module (bsc#1104353).
- net: hns3: Remove a useless member of struct hns3_stats (bsc#1104353).
- net: hns3: Remove error log when getting pfc stats fails (bsc#1104353).
- net: hns3: Remove packet statistics in the range of 8192~12287 (bsc#1104353).
- net: hns3: remove redundant memset when alloc buffer (bsc#1104353).
- net: hns3: remove redundant semicolon (bsc#1104353).
- net: hns3: Remove repeat statistic of rx_errors (bsc#1104353 ).
- net: hns3: Removes unnecessary check when clearing TX/RX rings (bsc#1104353).
- net: hns3: remove TSO config command from VF driver (bsc#1104353 ).
- net: hns3: remove unnecessary pci_set_drvdata() and devm_kfree() (bsc#1104353).
- net: hns3: remove unused GL setup function (bsc#1104353 ).
- net: hns3: remove unused hclgevf_cfg_func_mta_filter (bsc#1104353).
- net: hns3: Remove unused led control code (bsc#1104353 ).
- net: hns3: report the function type the same line with hns3_nic_get_stats64 (bsc#1104353).
- net: hns3: set the cmdq out_vld bit to 0 after used (bsc#1104353 ).
- net: hns3: set the max ring num when alloc netdev (bsc#1104353 ).
- net: hns3: Setting for fc_mode and dcb enable flag in TM module (bsc#1104353).
- net: hns3: Support for dynamically assigning tx buffer to TC (bsc#1104353).
- net: hns3: Unified HNS3 {VF|PF} Ethernet Driver for hip08 SoC (bsc#1104353).
- net: hns3: unify the pause params setup function (bsc#1104353 ).
- net: hns3: Unify the strings display of packet statistics (bsc#1104353).
- net: hns3: Updates MSI/MSI-X alloc/free APIs(depricated) to new APIs (bsc#1104353).
- net: hns3: Updates RX packet info fetch in case of multi BD (bsc#1104353).
- net: hns3: Use enums instead of magic number in hclge_is_special_opcode (bsc#1104353).
- net: hns3: VF should get the real rss_size instead of rss_size_max (bsc#1104353).
- net: lan78xx: Fix race in tx pending skb size calculation (bsc#1100132).
- net: lan78xx: fix rx handling before first packet is send (bsc#1100132).
- net: qmi_wwan: add BroadMobi BM806U 2020:2033 (bsc#1087092).
- net: qmi_wwan: Add Netgear Aircard 779S (bsc#1090888).
- net-usb: add qmi_wwan if on lte modem wistron neweb d18q1 (bsc#1087092).
- net: usb: asix: replace mii_nway_restart in resume path (bsc#1100132).
- nohz: Fix local_timer_softirq_pending() (bsc#1051510).
- nvme: ensure forward progress during Admin passthru (git-fixes).
- nvme-fabrics: Ignore nr_io_queues option for discovery controllers (bsc#1102633).
- nvme: fixup crash on failed discovery (bsc#1103920).
- nvme.h: fixup ANA group descriptor format (bsc#1104111).
- nvme: use hw qid in trace events (bsc#1102633).
- orangefs: report attributes_mask and attributes for statx (bsc#1101832).
- orangefs: set i_size on new symlink (bsc#1101845).
- overflow.h: Add allocation size calculation helpers (bsc#1101116,).
- PCI: pciehp: Assume NoCompl+ for Thunderbolt ports (bsc#1051510).
- PCI: pciehp: Request control of native hotplug only if supported (bsc#1051510).
- PCI: Prevent sysfs disable of device while driver is attached (bsc#1051510).
- pinctrl: at91-pio4: add missing of_node_put (bsc#1051510).
- pinctrl: cannonlake: Fix community ordering for H variant (bsc#1051510).
- pinctrl: core: Return selector to the pinctrl driver (bsc#1051510).
- pinctrl: freescale: off by one in imx1_pinconf_group_dbg_show() (bsc#1051510).
- pinctrl: imx: off by one in imx_pinconf_group_dbg_show() (bsc#1051510).
- pinctrl: intel: Add Intel Lewisburg GPIO support ().
- pinctrl: nand: meson-gxl: fix missing data pins (bsc#1051510).
- pinctrl: pinmux: Return selector to the pinctrl driver (bsc#1051510).
- pinctrl: qcom: spmi-gpio: Fix pmic_gpio_config_get() to be compliant (bsc#1051510).
- pinctrl: single: Fix group and function selector use (bsc#1051510).
- PM / devfreq: rk3399_dmc: Fix duplicated opp table on reload (bsc#1051510).
- pmem: only set QUEUE_FLAG_DAX for fsdax mode (bsc#1103917).
- powerpc/64: Add GENERIC_CPU support for little endian ().
- powerpc/fadump: handle crash memory ranges array index overflow (bsc#1103269).
- powerpc/fadump: merge adjacent memory ranges to reduce PT_LOAD segements (bsc#1103269).
- powerpc/pkeys: Deny read/write/execute by default (bsc#1097577).
- powerpc/pkeys: Fix calculation of total pkeys (bsc#1097577).
- powerpc/pkeys: Give all threads control of their key permissions (bsc#1097577).
- powerpc/pkeys: key allocation/deallocation must not change pkey registers (bsc#1097577).
- powerpc/pkeys: make protection key 0 less special (bsc#1097577).
- powerpc/pkeys: Preallocate execute-only key (bsc#1097577).
- powerpc/pkeys: Save the pkey registers before fork (bsc#1097577).
- qed*: Add link change count value to ethtool statistics display (bsc#1086314).
- qed: Add qed APIs for PHY module query (bsc#1086314 ).
- qed: Add srq core support for RoCE and iWARP (bsc#1086314 ).
- qede: Add driver callbacks for eeprom module query (bsc#1086314 ).
- qedf: Add get_generic_tlv_data handler (bsc#1086317).
- qedf: Add support for populating ethernet TLVs (bsc#1086317).
- qed: fix spelling mistake 'successffuly' -> 'successfully' (bsc#1086314).
- qedi: Add get_generic_tlv_data handler (bsc#1086315).
- qedi: Add support for populating ethernet TLVs (bsc#1086315).
- qed: Make some functions static (bsc#1086314).
- qed: remove redundant functions qed_get_cm_pq_idx_rl (bsc#1086314).
- qed: remove redundant functions qed_set_gft_event_id_cm_hdr (bsc#1086314).
- qed: remove redundant pointer 'name' (bsc#1086314).
- qed: use dma_zalloc_coherent instead of allocator/memset (bsc#1086314).
- qed*: Utilize FW 8.37.2.0 (bsc#1086314).
- RDMA/hns: Add 64KB page size support for hip08 (bsc#1104427 ).
- RDMA/hns: Add command queue support for hip08 RoCE driver (bsc#1104427).
- RDMA/hns: Add CQ operations support for hip08 RoCE driver (bsc#1104427).
- RDMA/hns: Add detailed comments for mb() call (bsc#1104427 ).
- RDMA/hns: Add eq support of hip08 (bsc#1104427).
- RDMA/hns: Add gsi qp support for modifying qp in hip08 (bsc#1104427).
- RDMA/hns: Add mailbox's implementation for hip08 RoCE driver (bsc#1104427).
- RDMA/hns: Add modify CQ support for hip08 (bsc#1104427 ).
- RDMA/hns: Add names to function arguments in function pointers (bsc#1104427).
- RDMA/hns: Add profile support for hip08 driver (bsc#1104427 ).
- RDMA/hns: Add QP operations support for hip08 SoC (bsc#1104427 ).
- RDMA/hns: Add releasing resource operation in error branch (bsc#1104427).
- RDMA/hns: Add rereg mr support for hip08 (bsc#1104427 ).
- RDMA/hns: Add reset process for RoCE in hip08 (bsc#1104427 ).
- RDMA/hns: Add return operation when configured global param fail (bsc#1104427).
- RDMA/hns: Add rq inline data support for hip08 RoCE (bsc#1104427 ).
- RDMA/hns: Add rq inline flags judgement (bsc#1104427 ).
- RDMA/hns: Add sq_invld_flg field in QP context (bsc#1104427 ).
- RDMA/hns: Add support for processing send wr and receive wr (bsc#1104427).
- RDMA/hns: Add the interfaces to support multi hop addressing for the contexts in hip08 (bsc#1104427).
- RDMA/hns: Adjust the order of cleanup hem table (bsc#1104427 ).
- RDMA/hns: Assign dest_qp when deregistering mr (bsc#1104427 ).
- RDMA/hns: Assign the correct value for tx_cqn (bsc#1104427 ).
- RDMA/hns: Assign zero for pkey_index of wc in hip08 (bsc#1104427 ).
- RDMA/hns: Avoid NULL pointer exception (bsc#1104427 ).
- RDMA/hns: Bugfix for cq record db for kernel (bsc#1104427 ).
- RDMA/hns: Bugfix for init hem table (bsc#1104427).
- RDMA/hns: Bugfix for rq record db for kernel (bsc#1104427 ).
- RDMA/hns: Check return value of kzalloc (bsc#1104427 ).
- RDMA/hns: Configure BT BA and BT attribute for the contexts in hip08 (bsc#1104427).
- RDMA/hns: Configure fence attribute in hip08 RoCE (bsc#1104427 ).
- RDMA/hns: Configure mac and gid and user access region for hip08 RoCE driver (bsc#1104427).
- RDMA/hns: Configure sgid type for hip08 RoCE (bsc#1104427 ).
- RDMA/hns: Configure the MTPT in hip08 (bsc#1104427).
- RDMA/hns: Configure TRRL field in hip08 RoCE device (bsc#1104427 ).
- RDMA/hns: Create gsi qp in hip08 (bsc#1104427).
- RDMA/hns: Delete the unnecessary initializing enum to zero (bsc#1104427).
- RDMA/hns: Do not unregister a callback we didn't register (bsc#1104427).
- RDMA/hns: Drop local zgid in favor of core defined variable (bsc#1104427).
- RDMA/hns: Enable inner_pa_vld filed of mpt (bsc#1104427 ).
- RDMA/hns: Enable the cqe field of sqwqe of RC (bsc#1104427 ).
- RDMA/hns: ensure for-loop actually iterates and free's buffers (bsc#1104427).
- RDMA/hns: Fill sq wqe context of ud type in hip08 (bsc#1104427 ).
- RDMA/hns: Filter for zero length of sge in hip08 kernel mode (bsc#1104427).
- RDMA/hns: Fix a bug with modifying mac address (bsc#1104427 ).
- RDMA/hns: Fix a couple misspellings (bsc#1104427).
- RDMA/hns: Fix calltrace for sleeping in atomic (bsc#1104427 ).
- RDMA/hns: Fix cqn type and init resp (bsc#1104427).
- RDMA/hns: Fix cq record doorbell enable in kernel (bsc#1104427 ).
- RDMA/hns: Fix endian problems around imm_data and rkey (bsc#1104427).
- RDMA/hns: Fix inconsistent warning (bsc#1104427).
- RDMA/hns: Fix init resp when alloc ucontext (bsc#1104427 ).
- RDMA/hns: Fix misplaced call to hns_roce_cleanup_hem_table (bsc#1104427).
- RDMA/hns: Fix QP state judgement before receiving work requests (bsc#1104427).
- RDMA/hns: Fix QP state judgement before sending work requests (bsc#1104427).
- RDMA/hns: fix spelling mistake: 'Reseved' -> 'Reserved' (bsc#1104427).
- RDMA/hns: Fix the bug with NULL pointer (bsc#1104427 ).
- RDMA/hns: Fix the bug with rq sge (bsc#1104427).
- RDMA/hns: Fix the endian problem for hns (bsc#1104427 ).
- RDMA/hns: Fix the illegal memory operation when cross page (bsc#1104427).
- RDMA/hns: Fix the issue of IOVA not page continuous in hip08 (bsc#1104427).
- RDMA/hns: Fix the qp context state diagram (bsc#1104427 ).
- RDMA/hns: Generate gid type of RoCEv2 (bsc#1104427).
- RDMA/hns: Get rid of page operation after dma_alloc_coherent (bsc#1104427).
- RDMA/hns: Get rid of virt_to_page and vmap calls after dma_alloc_coherent (bsc#1104427).
- RDMA/hns: Implement the disassociate_ucontext API (bsc#1104427 ).
- RDMA/hns: Increase checking CMQ status timeout value (bsc#1104427).
- RDMA/hns: Initialize the PCI device for hip08 RoCE (bsc#1104427 ).
- RDMA/hns: Intercept illegal RDMA operation when use inline data (bsc#1104427).
- RDMA/hns: Load the RoCE dirver automatically (bsc#1104427 ).
- RDMA/hns: make various function static, fixes warnings (bsc#1104427).
- RDMA/hns: Modify assignment device variable to support both PCI device and platform device (bsc#1104427).
- RDMA/hns: Modify the usage of cmd_sn in hip08 (bsc#1104427 ).
- RDMA/hns: Modify the value with rd dest_rd of qp_attr (bsc#1104427).
- RDMA/hns: Modify uar allocation algorithm to avoid bitmap exhaust (bsc#1104427).
- RDMA/hns: Move priv in order to add multiple hns_roce support (bsc#1104427).
- RDMA/hns: Move the location for initializing tmp_len (bsc#1104427).
- RDMA/hns: Not support qp transition from reset to reset for hip06 (bsc#1104427).
- RDMA/hns: Only assign dest_qp if IB_QP_DEST_QPN bit is set (bsc#1104427).
- RDMA/hns: Only assign dqpn if IB_QP_PATH_DEST_QPN bit is set (bsc#1104427).
- RDMA/hns: Only assign mtu if IB_QP_PATH_MTU bit is set (bsc#1104427).
- RDMA/hns: Refactor code for readability (bsc#1104427 ).
- RDMA/hns: Refactor eq code for hip06 (bsc#1104427).
- RDMA/hns: remove redundant assignment to variable j (bsc#1104427 ).
- RDMA/hns: Remove some unnecessary attr_mask judgement (bsc#1104427).
- RDMA/hns: Remove unnecessary operator (bsc#1104427).
- RDMA/hns: Remove unnecessary platform_get_resource() error check (bsc#1104427).
- RDMA/hns: Rename the idx field of db (bsc#1104427).
- RDMA/hns: Replace condition statement using hardware version information (bsc#1104427).
- RDMA/hns: Replace __raw_write*(cpu_to_le*()) with LE write*() (bsc#1104427).
- RDMA/hns: return 0 rather than return a garbage status value (bsc#1104427).
- RDMA/hns_roce: Do not check return value of zap_vma_ptes() (bsc#1104427).
- RDMA/hns: Set access flags of hip08 RoCE (bsc#1104427 ).
- RDMA/hns: Set desc_dma_addr for zero when free cmq desc (bsc#1104427).
- RDMA/hns: Set NULL for __internal_mr (bsc#1104427).
- RDMA/hns: Set rdma_ah_attr type for querying qp (bsc#1104427 ).
- RDMA/hns: Set se attribute of sqwqe in hip08 (bsc#1104427 ).
- RDMA/hns: Set sq_cur_sge_blk_addr field in QPC in hip08 (bsc#1104427).
- RDMA/hns: Set the guid for hip08 RoCE device (bsc#1104427 ).
- RDMA/hns: Set the owner field of SQWQE in hip08 RoCE (bsc#1104427).
- RDMA/hns: Split CQE from MTT in hip08 (bsc#1104427).
- RDMA/hns: Split hw v1 driver from hns roce driver (bsc#1104427 ).
- RDMA/hns: Submit bad wr (bsc#1104427).
- RDMA/hns: Support cq record doorbell for kernel space (bsc#1104427).
- RDMA/hns: Support cq record doorbell for the user space (bsc#1104427).
- RDMA/hns: Support multi hop addressing for PBL in hip08 (bsc#1104427).
- RDMA/hns: Support rq record doorbell for kernel space (bsc#1104427).
- RDMA/hns: Support rq record doorbell for the user space (bsc#1104427).
- RDMA/hns: Support WQE/CQE/PBL page size configurable feature in hip08 (bsc#1104427).
- RDMA/hns: Unify the calculation for hem index in hip08 (bsc#1104427).
- RDMA/hns: Update assignment method for owner field of send wqe (bsc#1104427).
- RDMA/hns: Update calculation of irrl_ba field for hip08 (bsc#1104427).
- RDMA/hns: Update convert function of endian format (bsc#1104427 ).
- RDMA/hns: Update the interfaces for MTT/CQE multi hop addressing in hip08 (bsc#1104427).
- RDMA/hns: Update the IRRL table chunk size in hip08 (bsc#1104427 ).
- RDMA/hns: Update the PD CQE MTT specification in hip08 (bsc#1104427).
- RDMA/hns: Update the usage of ack timeout in hip08 (bsc#1104427 ).
- RDMA/hns: Update the usage of sr_max and rr_max field (bsc#1104427).
- RDMA/hns: Update the verbs of polling for completion (bsc#1104427).
- RDMA/hns: Use free_pages function instead of free_page (bsc#1104427).
- RDMA/hns: Use structs to describe the uABI instead of opencoding (bsc#1104427).
- RDMA/qedr: Fix NULL pointer dereference when running over iWARP without RDMA-CM (bsc#1086314).
- RDMA/qedr: fix spelling mistake: 'adrresses' -> 'addresses' (bsc#1086314).
- RDMA/qedr: fix spelling mistake: 'failes' -> 'fails' (bsc#1086314).
- regulator: pfuze100: add .is_enable() for pfuze100_swb_regulator_ops (bsc#1051510).
- reiserfs: fix buffer overflow with long warning messages (bsc#1101847).
- Revert 'drm/nouveau/drm/therm/fan: add a fallback if no fan control is specified in the vbios' (bsc#1103356).
- rtc: ensure rtc_set_alarm fails when alarms are not supported (bsc#1051510).
- s390/cio: clear timer when terminating driver I/O (bsc#1103421).
- s390/cio: fix return code after missing interrupt (bsc#1103421).
- s390/dasd: configurable IFCC handling (bsc#1097808).
- s390/dasd: fix handling of internal requests (bsc#1103421).
- s390/dasd: fix wrongly assigned configuration data (bsc#1103421).
- s390/dasd: prevent prefix I/O error (bsc#1103421).
- s390/eadm: fix CONFIG_BLOCK include dependency (bsc#1103421).
- s390/ipl: ensure loadparm valid flag is set (bsc#1103421).
- s390/pci: do not require AIS facility (bsc#1103421).
- s390/qdio: do not release memory in qdio_setup_irq() (bsc#1103421).
- sc16is7xx: Check for an error when the clock is enabled (bsc#1051510).
- sched/debug: Reverse the order of printing faults (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Consider RT/IRQ pressure in capacity_spare_wake() (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Fix find_idlest_group() when local group is not allowed (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Fix usage of find_idlest_group() when no groups are allowed (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Fix usage of find_idlest_group() when the local group is idlest (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Move select_task_rq_fair() slow-path into its own function (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Remove impossible condition from find_idlest_group_cpu() (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Remove unnecessary comparison with -1 (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Spare idle load balancing on nohz_full CPUs (bnc#1101669 optimise numa balancing for fast migrate).
- sched/fair: Use 'unsigned long' for utilization, consistently (bnc#1101669 optimise numa balancing for fast migrate).
- sched/numa: Evaluate move once per node (bnc#1101669 optimise numa balancing for fast migrate).
- sched/numa: Modify migrate_swap() to accept additional parameters (bnc#1101669 optimise numa balancing for fast migrate).
- sched/numa: Move task_numa_placement() closer to numa_migrate_preferred() (bnc#1101669 optimise numa balancing for fast migrate).
- sched/numa: Remove redundant field (bnc#1101669 optimise numa balancing for fast migrate).
- sched/numa: Remove redundant field -kabi (bnc#1101669 optimise numa balancing for fast migrate).
- sched/numa: Remove unused task_capacity from 'struct numa_stats' (bnc#1101669 optimise numa balancing for fast migrate).
- sched/numa: Set preferred_node based on best_cpu (bnc#1101669 optimise numa balancing for fast migrate).
- sched/numa: Simplify load_too_imbalanced() (bnc#1101669 optimise numa balancing for fast migrate).
- sched/numa: Skip nodes that are at 'hoplimit' (bnc#1101669 optimise numa balancing for fast migrate).
- sched/numa: Update the scan period without holding the numa_group lock (bnc#1101669 optimise numa balancing for fast migrate).
- sched/numa: Use group_weights to identify if migration degrades locality (bnc#1101669 optimise numa balancing for fast migrate).
- sched/numa: Use task faults only if numa_group is not yet set up (bnc#1101669 optimise numa balancing for fast migrate).
- sched/smt: Update sched_smt_present at runtime (bsc#1089343).
- scsi: ata: enhance the definition of SET MAX feature field value ().
- scsi: hisi_sas: add an mechanism to do reset work synchronously ().
- scsi: hisi_sas: add check of device in hisi_sas_task_exec() ().
- scsi: hisi_sas: add internal abort dev in some places ().
- scsi: hisi_sas: Add LED feature for v3 hw ().
- scsi: hisi_sas: add RAS feature for v3 hw ().
- scsi: hisi_sas: add readl poll timeout helper wrappers ().
- scsi: hisi_sas: Add some checks to avoid free'ing a sas_task twice ().
- scsi: hisi_sas: add some print to enhance debugging ().
- scsi: hisi_sas: Add v2 hw force PHY function for internal ATA command ().
- scsi: hisi_sas: add v2 hw port AXI error handling support ().
- scsi: hisi_sas: add v3 hw MODULE_DEVICE_TABLE() ().
- scsi: hisi_sas: add v3 hw suspend and resume ().
- scsi: hisi_sas: allocate slot buffer earlier ().
- scsi: hisi_sas: Change common allocation mode of device id ().
- scsi: hisi_sas: Change frame type for SET MAX commands ().
- scsi: hisi_sas: change ncq process for v3 hw ().
- scsi: hisi_sas: change slot index allocation mode ().
- scsi: hisi_sas: check host frozen before calling 'done' function ().
- scsi: hisi_sas: check IPTT is valid before using it for v3 hw ().
- scsi: hisi_sas: check sas_dev gone earlier in hisi_sas_abort_task() ().
- scsi: hisi_sas: Code cleanup and minor bug fixes ().
- scsi: hisi_sas: config ATA de-reset as an constrained command for v3 hw ().
- scsi: hisi_sas: consolidate command check in hisi_sas_get_ata_protocol() ().
- scsi: hisi_sas: Create a scsi_host_template per HW module ().
- scsi: hisi_sas: delete timer when removing hisi_sas driver ().
- scsi: hisi_sas: do link reset for some CHL_INT2 ints ().
- scsi: hisi_sas: Do not lock DQ for complete task sending ().
- scsi: hisi_sas: dt-bindings: add an property of signal attenuation ().
- scsi: hisi_sas: fix a bug in hisi_sas_dev_gone() ().
- scsi: hisi_sas: fix a typo in hisi_sas_task_prep() ().
- scsi: hisi_sas: fix dma_unmap_sg() parameter ().
- scsi: hisi_sas: fix PI memory size ().
- scsi: hisi_sas: fix return value of hisi_sas_task_prep() ().
- scsi: hisi_sas: Fix return value when get_free_slot() failed ().
- scsi: hisi_sas: fix SAS_QUEUE_FULL problem while running IO ().
- scsi: hisi_sas: fix the issue of link rate inconsistency ().
- scsi: hisi_sas: fix the issue of setting linkrate register ().
- scsi: hisi_sas: improve int_chnl_int_v2_hw() consistency with v3 hw ().
- scsi: hisi_sas: Include TMF elements in struct hisi_sas_slot ().
- scsi: hisi_sas: increase timer expire of internal abort task ().
- scsi: hisi_sas: Init disks after controller reset ().
- scsi: hisi_sas: initialize dq spinlock before use ().
- scsi: hisi_sas: Introduce hisi_sas_phy_set_linkrate() ().
- scsi: hisi_sas: judge result of internal abort ().
- scsi: hisi_sas: make local symbol host_attrs static ().
- scsi: hisi_sas: make return type of prep functions void ().
- scsi: hisi_sas: make SAS address of SATA disks unique ().
- scsi: hisi_sas: Mark PHY as in reset for nexus reset ().
- scsi: hisi_sas: modify hisi_sas_dev_gone() for reset ().
- scsi: hisi_sas: modify some register config for hip08 ().
- scsi: hisi_sas: optimise port id refresh function ().
- scsi: hisi_sas: optimise the usage of DQ locking ().
- scsi: hisi_sas: print device id for errors ().
- scsi: hisi_sas: re-add the lldd_port_deformed() ().
- scsi: hisi_sas: relocate clearing ITCT and freeing device ().
- scsi: hisi_sas: relocate smp sg map ().
- scsi: hisi_sas: Remove depends on HAS_DMA in case of platform dependency ().
- scsi: hisi_sas: remove redundant handling to event95 for v3 ().
- scsi: hisi_sas: remove some unneeded structure members ().
- scsi: hisi_sas: remove unused variable hisi_sas_devices.running_req ().
- scsi: hisi_sas: Reset disks when discovered ().
- scsi: hisi_sas: some optimizations of host controller reset ().
- scsi: hisi_sas: stop controller timer for reset ().
- scsi: hisi_sas: support the property of signal attenuation for v2 hw ().
- scsi: hisi_sas: Terminate STP reject quickly for v2 hw ().
- scsi: hisi_sas: Try wait commands before before controller reset ().
- scsi: hisi_sas: update PHY linkrate after a controller reset ().
- scsi: hisi_sas: update RAS feature for later revision of v3 HW ().
- scsi: hisi_sas: use an general way to delay PHY work ().
- scsi: hisi_sas: Use device lock to protect slot alloc/free ().
- scsi: hisi_sas: use dma_zalloc_coherent() ().
- scsi: hisi_sas: workaround a v3 hw hilink bug ().
- scsi: libsas: defer ata device eh commands to libata ().
- scsi: lpfc: Add Buffer overflow check, when nvme_info larger than PAGE_SIZE (bsc#1102658).
- scsi: lpfc: Correct LCB ACCept payload (bsc#1102658).
- scsi: lpfc: devloss timeout race condition caused null pointer reference (bsc#1102658).
- scsi: lpfc: Fix abort error path for NVMET (bsc#1102658).
- scsi: lpfc: Fix driver crash when re-registering NVME rports (bsc#1102658).
- scsi: lpfc: Fix driver not setting dpp bits correctly in doorbell word (bsc#1102658).
- scsi: lpfc: Fix ELS abort on SLI-3 adapters (bsc#1102658).
- scsi: lpfc: Fix list corruption on the completion queue (bsc#1102658).
- scsi: lpfc: Fix NVME Target crash in defer rcv logic (bsc#1102658).
- scsi: lpfc: Fix panic if driver unloaded when port is offline (bsc#1102658).
- scsi: lpfc: Fix sysfs Speed value on CNA ports (bsc#1102658).
- scsi: lpfc: Limit tracking of tgt queue depth in fast path (bsc#1102658).
- scsi: lpfc: Make PBDE optimizations configurable (bsc#1102658).
- scsi: lpfc: Remove lpfc_enable_pbde as module parameter (bsc#1102658).
- scsi: lpfc: Revise copyright for new company language (bsc#1102658).
- scsi: lpfc: Support duration field in Link Cable Beacon V1 command (bsc#1102658).
- scsi: lpfc: update driver version to 12.0.0.5 (bsc#1102658).
- scsi: lpfc: update driver version to 12.0.0.6 (bsc#1102658).
- scsi: mpt3sas: Add an I/O barrier (bsc#1086906,).
- scsi: mpt3sas: Added support for SAS Device Discovery Error Event (bsc#1086906,).
- scsi: mpt3sas: Add PCI device ID for Andromeda (bsc#1086906,).
- scsi: mpt3sas: Allow processing of events during driver unload (bsc#1086906,).
- scsi: mpt3sas: As per MPI-spec, use combined reply queue for SAS3.5 controllers when HBA supports more than 16 MSI-x vectors (bsc#1086906,).
- scsi: mpt3sas: Bug fix for big endian systems (bsc#1086906,).
- scsi: mpt3sas: Cache enclosure pages during enclosure add (bsc#1086906,).
- scsi: mpt3sas: clarify mmio pointer types (bsc#1086906,).
- scsi: mpt3sas: Configure reply post queue depth, DMA and sgl tablesize (bsc#1086906,).
- scsi: mpt3sas: Do not abort I/Os issued to NVMe drives while processing Async Broadcast primitive event (bsc#1086906,).
- scsi: mpt3sas: Do not access the structure after decrementing it's instance reference count (bsc#1086906,).
- scsi: mpt3sas: Do not mark fw_event workqueue as WQ_MEM_RECLAIM (bsc#1086906,).
- scsi: mpt3sas: Enhanced handling of Sense Buffer (bsc#1086906,).
- scsi: mpt3sas: Fix, False timeout prints for ioctl and other internal commands during controller reset (bsc#1086906,).
- scsi: mpt3sas: fix possible memory leak (bsc#1086906,).
- scsi: mpt3sas: fix spelling mistake: 'disbale' -> 'disable' (bsc#1086906,).
- scsi: mpt3sas: For NVME device, issue a protocol level reset (bsc#1086906,).
- scsi: mpt3sas: Incorrect command status was set/marked as not used (bsc#1086906,).
- scsi: mpt3sas: Increase event log buffer to support 24 port HBA's (bsc#1086906,).
- scsi: mpt3sas: Introduce API to get BAR0 mapped buffer address (bsc#1086906,).
- scsi: mpt3sas: Introduce Base function for cloning (bsc#1086906,).
- scsi: mpt3sas: Introduce function to clone mpi reply (bsc#1086906,).
- scsi: mpt3sas: Introduce function to clone mpi request (bsc#1086906,).
- scsi: mpt3sas: Lockless access for chain buffers (bsc#1086906,).
- scsi: mpt3sas: Optimize I/O memory consumption in driver (bsc#1086906,).
- scsi: mpt3sas: Pre-allocate RDPQ Array at driver boot time (bsc#1086906,).
- scsi: mpt3sas: Replace PCI pool old API (bsc#1081917).
- scsi: mpt3sas: Report Firmware Package Version from HBA Driver (bsc#1086906,).
- scsi: mpt3sas: Update driver version '25.100.00.00' (bsc#1086906,).
- scsi: mpt3sas: Update driver version '26.100.00.00' (bsc#1086906,).
- scsi: mpt3sas: Update MPI Headers (bsc#1086906,).
- scsi: qedf: Add additional checks when restarting an rport due to ABTS timeout (bsc#1086317).
- scsi: qedf: Add check for offload before flushing I/Os for target (bsc#1086317).
- scsi: qedf: Add dcbx_not_wait module parameter so we won't wait for DCBX convergence to start discovery (bsc#1086317).
- scsi: qedf: Add missing skb frees in error path (bsc#1086317).
- scsi: qedf: Add more defensive checks for concurrent error conditions (bsc#1086317).
- scsi: qedf: Add task id to kref_get_unless_zero() debug messages when flushing requests (bsc#1086317).
- scsi: qedf: Check if link is already up when receiving a link up event from qed (bsc#1086317).
- scsi: qedf: fix LTO-enabled build (bsc#1086317).
- scsi: qedf: Fix VLAN display when printing sent FIP frames (bsc#1086317).
- scsi: qedf: Honor default_prio module parameter even if DCBX does not converge (bsc#1086317).
- scsi: qedf: Honor priority from DCBX FCoE App tag (bsc#1086317).
- scsi: qedf: If qed fails to enable MSI-X fail PCI probe (bsc#1086317).
- scsi: qedf: Improve firmware debug dump handling (bsc#1086317).
- scsi: qedf: Increase the number of default FIP VLAN request retries to 60 (bsc#1086317).
- scsi: qedf: Release RRQ reference correctly when RRQ command times out (bsc#1086317).
- scsi: qedf: remove redundant initialization of 'fcport' (bsc#1086317).
- scsi: qedf: Remove setting DCBX pending during soft context reset (bsc#1086317).
- scsi: qedf: Return request as DID_NO_CONNECT if MSI-X is not enabled (bsc#1086317).
- scsi: qedf: Sanity check FCoE/FIP priority value to make sure it's between 0 and 7 (bsc#1086317).
- scsi: qedf: Send the driver state to MFW (bsc#1086317).
- scsi: qedf: Set the UNLOADING flag when removing a vport (bsc#1086317).
- scsi: qedf: Synchronize rport restarts when multiple ELS commands time out (bsc#1086317).
- scsi: qedf: Update copyright for 2018 (bsc#1086317).
- scsi: qedf: Update version number to 8.33.16.20 (bsc#1086317).
- scsi: qedf: use correct strncpy() size (bsc#1086317).
- scsi: qedi: fix building with LTO (bsc#1086315).
- scsi: qedi: fix build regression (bsc#1086315).
- scsi: qedi: Fix kernel crash during port toggle (bsc#1086315).
- scsi: qedi: Send driver state to MFW (bsc#1086315).
- scsi: qla2xxx: Avoid double completion of abort command (git-fixes).
- scsi: qla2xxx: correctly shift host byte (bsc#1086327,).
- scsi: qla2xxx: Correct setting of SAM_STAT_CHECK_CONDITION (bsc#1086327,).
- scsi: qla2xxx: Fix crash on qla2x00_mailbox_command (bsc#1086327,).
- scsi: qla2xxx: Fix driver unload by shutting down chip (git-fixes).
- scsi: qla2xxx: Fix Inquiry command being dropped in Target mode (bsc#1086327,).
- scsi: qla2xxx: Fix NPIV deletion by calling wait_for_sess_deletion (git-fixes).
- scsi: qla2xxx: Fix NULL pointer dereference for fcport search (git-fixes).
- scsi: qla2xxx: Fix race condition between iocb timeout and initialisation (bsc#1086327,).
- scsi: qla2xxx: Fix Rport and session state getting out of sync (bsc#1086327,).
- scsi: qla2xxx: Fix sending ADISC command for login (bsc#1086327,).
- scsi: qla2xxx: Fix setting lower transfer speed if GPSC fails (bsc#1086327,).
- scsi: qla2xxx: Fix TMF and Multi-Queue config (bsc#1086327,).
- scsi: qla2xxx: Fix unintialized List head crash (git-fixes).
- scsi: qla2xxx: Move GPSC and GFPNID out of session management (bsc#1086327,).
- scsi: qla2xxx: Prevent relogin loop by removing stale code (bsc#1086327,).
- scsi: qla2xxx: Reduce redundant ADISC command for RSCNs (bsc#1086327,).
- scsi: qla2xxx: remove irq save in qla2x00_poll() (bsc#1086327,).
- scsi: qla2xxx: Remove stale debug value for login_retry flag (bsc#1086327,).
- scsi: qla2xxx: Return error when TMF returns (git-fixes).
- scsi: qla2xxx: Update driver version to 10.00.00.07-k (bsc#1086327,).
- scsi: qla2xxx: Use predefined get_datalen_for_atio() inline function (bsc#1086327,).
- scsi: qla4xxx: Move an array from a .h into a .c file (bsc#1086331).
- scsi: qla4xxx: Remove unused symbols (bsc#1086331).
- scsi: qla4xxx: skip error recovery in case of register disconnect (bsc#1086331).
- scsi: qla4xxx: Use dma_pool_zalloc() (bsc#1086331).
- scsi: qla4xxx: Use zeroing allocator rather than allocator/memset (bsc#1086331).
- scsi: smartpqi: add in new supported controllers (bsc#1086274).
- scsi: smartpqi: add inspur advantech ids (bsc#1086274).
- scsi: smartpqi: bump driver version to 1.1.4-130 (bsc#1086274).
- scsi: smartpqi: fix critical ARM issue reading PQI index registers (bsc#1086274).
- scsi: smartpqi: improve error checking for sync requests (bsc#1086274).
- scsi: smartpqi: improve handling for sync requests (bsc#1086274).
- scsi: smartpqi: update driver version (bsc#1086274).
- scsi: smartpqi: workaround fw bug for oq deletion (bsc#1086274).
- sctp: fix the issue that pathmtu may be set lower than MINSEGMENT (git-fixes).
- sctp: introduce sctp_dst_mtu (git-fixes).
- selftests/powerpc: Fix core-pkey for default execute permission change (bsc#1097577).
- selftests/powerpc: Fix ptrace-pkey for default execute permission change (bsc#1097577).
- series.conf: Sort automatic NUMA balancing related patch
- soc: bcm2835: Make !RASPBERRYPI_FIRMWARE dummies return failure (bsc#1051510).
- soc: bcm: raspberrypi-power: Fix use of __packed (bsc#1051510).
- soc: imx: gpc: de-register power domains only if initialized (bsc#1051510).
- soc: imx: gpc: restrict register range for regmap access (bsc#1051510).
- soc: imx: gpcv2: correct PGC offset (bsc#1051510).
- soc: imx: gpcv2: Do not pass static memory as platform data (bsc#1051510).
- soc: imx: gpcv2: fix regulator deferred probe (bsc#1051510).
- soc: mediatek: pwrap: fix compiler errors (bsc#1051510).
- soc: qcom: wcnss_ctrl: Fix increment in NV upload (bsc#1051510).
- soc: rockchip: power-domain: Fix wrong value when power up pd with writemask (bsc#1051510).
- soc/tegra: Fix bad of_node_put() in powergate init (bsc#1051510).
- soc/tegra: flowctrl: Fix error handling (bsc#1051510).
- soc: ti: ti_sci_pm_domains: Populate name for genpd (bsc#1051510).
- soc: zte: Restrict SOC_ZTE to ARCH_ZX or COMPILE_TEST (bsc#1051510).
- spi: bcm2835aux: ensure interrupts are enabled for shared handler (bsc#1051510).
- spi/bcm63xx-hspi: Enable the clock before calling clk_get_rate() (bsc#1051510).
- spi: bcm-qspi: Always read and set BSPI_MAST_N_BOOT_CTRL (bsc#1051510).
- spi: bcm-qspi: Avoid setting MSPI_CDRAM_PCS for spi-nor master (bsc#1051510).
- spi: cadence: Add usleep_range() for cdns_spi_fill_tx_fifo() (bsc#1051510).
- spi: pxa2xx: Allow 64-bit DMA (bsc#1051510).
- spi: pxa2xx: check clk_prepare_enable() return value (bsc#1051510).
- spi: spi-fsl-dspi: Fix imprecise abort on VF500 during probe (bsc#1051510).
- sr: pass down correctly sized SCSI sense buffer (git-fixes).
- staging: ks7010: Use constants from ieee80211_eid instead of literal ints (bsc#1051510).
- staging: speakup: fix wraparound in uaccess length check (bsc#1051510).
- supported.conf: add drivers/md/dm-writecache
- supported.conf: added hns3 modules
- supported.conf: added hns-roce-hw-v1 and hns-roce-hw-v2
- supported.conf: Enable HiSi v3 SAS adapter ()
- sysrq : fix Show Regs call trace on ARM (bsc#1051510).
- TCM_RBD depends on BLK_DEV_RBD ().
- thermal: exynos: fix setting rising_threshold for Exynos5433 (bsc#1051510).
- tty: Fix data race in tty_insert_flip_string_fixed_flag (bsc#1051510).
- typec: tcpm: Fix a msecs vs jiffies bug (bsc#1100132).
- typec: tcpm: fusb302: Resolve out of order messaging events (bsc#1087092).
- udf: Detect incorrect directory size (bsc#1101891).
- udf: Provide saner default for invalid uid / gid (bsc#1101890).
- Update patches.arch/KVM-PPC-Check-if-IOMMU-page-is-contained-in-the-pinn.patch (bsc#1077761, git-fixes, bsc#1103948, bsc#1103949).
- usb: hub: Do not wait for connect state at resume for powered-off ports (bsc#1051510).
- usbip: usbip_detach: Fix memory, udev context and udev leak (bsc#1051510).
- vfs: add the sb_start_intwrite_trylock() helper (bsc#1101841).
- virtio_balloon: fix another race between migration and ballooning (bsc#1051510).
- wlcore: sdio: check for valid platform device data before suspend (bsc#1051510).
- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/KVM/VMX: Add module argument for L1TF mitigation.
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- x86: Treat R_X86_64_PLT32 as R_X86_64_PC32 (binutils_2.31).
- x86/xen: init %gs very early to avoid page faults with stack protector (bnc#1104777).
- xen-netback: fix input validation in xenvif_set_hash_mapping() (bnc#1103277).
- xen/netfront: do not cache skb_shinfo() (bnc#1065600).
- xfs: catch inode allocation state mismatch corruption (bsc#1104211).
- xfs: prevent creating negative-sized file via INSERT_RANGE (bsc#1101833).
- xhci: Fix perceived dead host due to runtime suspend race with event handler (bsc#1051510).
Patchnames
SUSE-SLE-Module-Public-Cloud-15-2018-1701
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 15 azure kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-5391: A remote attacker even with relatively low bandwidth could\n have caused lots of CPU usage by triggering the worst case scenario during\n fragment reassembly (bsc#1103097)\n- CVE-2018-3620, CVE-2018-3646: Local attackers in virtualized guest systems\n could use speculative code patterns on hyperthreaded processors to read data\n present in the L1 Datacache used by other hyperthreads on the same CPU core,\n potentially leaking sensitive data, even from other virtual machines or the\n host system. (bnc#1089343, bsc#1087081).\n- CVE-2018-10882: A local user could have caused an out-of-bound write, leading\n to denial of service and a system crash by unmounting a crafted ext4 filesystem\n image (bsc#1099849).\n- CVE-2018-10880: Prevent a stack-out-of-bounds write in the ext4 filesystem\n code when mounting and writing crafted ext4 images. An attacker could have used\n this to cause a system crash and a denial of service (bsc#1099845).\n- CVE-2018-10881: A local user could have caused an out-of-bound access and a\n system crash by mounting and operating on a crafted ext4 filesystem image\n (bsc#1099864).\n- CVE-2018-10877: Prevent an out-of-bound access in the ext4_ext_drop_refs()\n function when operating on a crafted ext4 filesystem image (bsc#1099846).\n- CVE-2018-10876: Prevent use-after-free in ext4_ext_remove_space() function\n when mounting and operating a crafted ext4 image (bsc#1099811).\n- CVE-2018-10878: A local user could have caused an out-of-bounds write and a\n denial of service by mounting and operating a crafted ext4 filesystem image\n (bsc#1099813).\n- CVE-2018-10883: A local user could have caused an out-of-bounds write in\n jbd2_journal_dirty_metadata(), a denial of service, and a system crash by\n mounting and operating on a crafted ext4 filesystem image (bsc#1099863).\n- CVE-2018-10879: A local user could have caused a use-after-free in\n ext4_xattr_set_entry function and a denial of service or unspecified other\n impact may occur by renaming a file in a crafted ext4 filesystem image\n (bsc#1099844).\n- CVE-2018-10853: A flaw was found in Linux Kernel KVM. In which certain\n instructions such as sgdt/sidt call segmented_write_std doesn\u0027t propagate\n access correctly. As such, during userspace induced exception, the\n guest can incorrectly assume that the exception happened in the kernel\n and panic. (bnc#1097104).\n\nThe following non-security bugs were fixed:\n\n- apci / lpss: Only call pwm_add_table() for Bay Trail PWM if PMIC HRV is 2 (bsc#1051510).\n- acpi / pci: Bail early in acpi_pci_add_bus() if there is no ACPI handle (bsc#1051510).\n- af_key: Always verify length of provided sadb_key (bsc#1051510).\n- af_key: fix buffer overread in parse_exthdrs() (bsc#1051510).\n- af_key: fix buffer overread in verify_address_len() (bsc#1051510).\n- afs: Fix directory permissions check (bsc#1101828).\n- agp: uninorth: make two functions static (bsc#1051510).\n- alsa: emu10k1: add error handling for snd_ctl_add (bsc#1051510).\n- alsa: emu10k1: Rate-limit error messages about page errors (bsc#1051510).\n- alsa: fm801: add error handling for snd_ctl_add (bsc#1051510).\n- alsa: snd-aoa: add of_node_put() in error path (bsc#1051510).\n- alsa: usb-audio: Apply rate limit to warning messages in URB complete callback (bsc#1051510).\n- arm64: Correct type for PUD macros (bsc#1103723).\n- arm64: Disable unhandled signal log messages by default (bsc#1103724).\n- arm64: KVM: fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1103725).\n- arm64: mm: Fix set_memory_valid() declaration (bsc#1103726).\n- arm64: perf: correct PMUVer probing (bsc#1103727).\n- arm64: ptrace: Avoid setting compat FPR to garbage if get_user fails (bsc#1103728).\n- arm64: spinlock: Fix theoretical trylock() A-B-A with LSE atomics (bsc#1103729).\n- arm64: vdso: fix clock_getres for 4GiB-aligned res (bsc#1103730).\n- arm: 8715/1: add a private asm/unaligned.h (bsc#1051510).\n- arm: 8720/1: ensure dump_instr() checks addr_limit (bsc#1051510).\n- arm: 8721/1: mm: dump: check hardware RO bit for LPAE (bsc#1051510).\n- arm: 8722/1: mm: make STRICT_KERNEL_RWX effective for LPAE (bsc#1051510).\n- arm: 8731/1: Fix csum_partial_copy_from_user() stack mismatch (bsc#1051510).\n- arm: 8743/1: bL_switcher: add MODULE_LICENSE tag (bsc#1051510).\n- arm: 8746/1: vfp: Go back to clearing vfp_current_hw_state[] (bsc#1051510).\n- arm: 8748/1: mm: Define vdso_start, vdso_end as array (bsc#1051510).\n- arm: 8753/1: decompressor: add a missing parameter to the addruart macro (bsc#1051510).\n- arm: 8758/1: decompressor: restore r1 and r2 just before jumping to the kernel (bsc#1051510).\n- arm: 8764/1: kgdb: fix NUMREGBYTES so that gdb_regs[] is the correct size (bsc#1051510).\n- arm: 8769/1: kprobes: Fix to use get_kprobe_ctlblk after irq-disabed (bsc#1051510).\n- arm: 8770/1: kprobes: Prohibit probing on optimized_callback (bsc#1051510).\n- arm: 8771/1: kprobes: Prohibit kprobes on do_undefinstr (bsc#1051510).\n- arm: 8772/1: kprobes: Prohibit kprobes on get_user functions (bsc#1051510).\n- arm: AM33xx: PRM: Remove am33xx_pwrdm_read_prev_pwrst function (bsc#1051510).\n- arm: amba: Fix race condition with driver_override (bsc#1051510).\n- arm: amba: Fix wrong indentation in driver_override_store() (bsc#1051510).\n- arm: amba: Make driver_override output consistent with other buses (bsc#1051510).\n- arm: at91: do not select CONFIG_ARM_CPU_SUSPEND for old platforms (bsc#1051510).\n- arm: avoid faulting on qemu (bsc#1051510).\n- arm: BUG if jumping to usermode address in kernel mode (bsc#1051510).\n- arm-ccn: perf: Prevent module unload while PMU is in use (bsc#1051510).\n- arm: davinci: Add dma_mask to dm365\u0027s eDMA device (bsc#1051510).\n- arm: davinci: board-da830-evm: fix GPIO lookup for MMC/SD (bsc#1051510).\n- arm: davinci: board-da850-evm: fix GPIO lookup for MMC/SD (bsc#1051510).\n- arm: davinci: board-da850-evm: fix WP pin polarity for MMC/SD (bsc#1051510).\n- arm: davinci: board-dm355-evm: fix broken networking (bsc#1051510).\n- arm: davinci: board-dm646x-evm: pass correct I2C adapter id for VPIF (bsc#1051510).\n- arm: davinci: board-dm646x-evm: set VPIF capture card name (bsc#1051510).\n- arm: davinci: board-omapl138-hawk: fix GPIO numbers for MMC/SD lookup (bsc#1051510).\n- arm: davinci: dm646x: fix timer interrupt generation (bsc#1051510).\n- arm: davinci: fix mmc entries in dm365\u0027s dma_slave_map (bsc#1051510).\n- arm: davinci: fix the GPIO lookup for omapl138-hawk (bsc#1051510).\n- arm: davinci: Use platform_device_register_full() to create pdev for dm365\u0027s eDMA (bsc#1051510).\n- arm: DRA722: remove redundant definition of 1.0 device (bsc#1051510).\n- arm: fix return value of parse_cpu_capacity (bsc#1051510).\n- arm: kexec: fix failure to boot crash kernel (bsc#1051510).\n- arm: kexec: fix kdump register saving on panic() (bsc#1051510).\n- arm: keystone: fix platform_domain_notifier array overrun (bsc#1051510).\n- arm: kvm: fix building with gcc-8 (bsc#1051510).\n- arm: multi_v7_defconfig: Replace DRM_RCAR_HDMI by generic bridge options (bsc#1051510).\n- arm: multi_v7_defconfig: Replace SND_SOC_RSRC_CARD by SND_SIMPLE_SCU_CARD (bsc#1051510).\n- arm: mvebu: Fix broken PL310_ERRATA_753970 selects (bsc#1051510).\n- arm: OMAP1: clock: Fix debugfs_create_*() usage (bsc#1051510).\n- arm: OMAP2+: Fix SRAM virt to phys translation for save_secure_ram_context (bsc#1051510).\n- arm: omap2: hide omap3_save_secure_ram on non-OMAP3 builds (bsc#1051510).\n- arm: OMAP2+: omap_device: drop broken RPM status update from suspend_noirq (bsc#1051510).\n- arm: OMAP2+: powerdomain: use raw_smp_processor_id() for trace (bsc#1051510).\n- arm: OMAP2+: timer: fix a kmemleak caused in omap_get_timer_dt (bsc#1051510).\n- arm: OMAP3: Fix prm wake interrupt for resume (bsc#1051510).\n- arm: OMAP3: hwmod_data: add missing module_offs for MMC3 (bsc#1051510).\n- arm: OMAP3+: PRM: fix of_irq_get() result check (bsc#1051510).\n- arm: OMAP4+: PRM: fix of_irq_get() result checks (bsc#1051510).\n- arm: OMAP: Fix dmtimer init for omap1 (bsc#1051510).\n- arm: OMAP: Fix SRAM W+X mapping (bsc#1051510).\n- arm: orion5x: Revert commit 4904dbda41c8 (bsc#1051510).\n- arm: orion: fix orion_ge00_switch_board_info initialization (bsc#1051510).\n- arm: pxa: select both FB and FB_W100 for eseries (bsc#1051510).\n- arm: pxa/tosa-bt: add MODULE_LICENSE tag (bsc#1051510).\n- arm: remove wrong CONFIG_PROC_SYSCTL ifdef (bsc#1051510).\n- arm: s3c24xx: Fix NAND ECC mode for mini2440 board (bsc#1051510).\n- arm: shmobile: defconfig: Enable missing PCIE_RCAR dependency (bsc#1051510).\n- arm: shmobile: defconfig: Replace DRM_RCAR_HDMI by generic bridge options (bsc#1051510).\n- arm: shmobile: defconfig: Replace SND_SOC_RSRC_CARD by SND_SIMPLE_SCU_CARD (bsc#1051510).\n- arm: shmobile: defconfig: Replace USB_XHCI_RCAR by USB_XHCI_PLATFORM (bsc#1051510).\n- arm: shmobile: rcar-gen2: Fix deadlock in regulator quirk (bsc#1051510).\n- arm: socfpga_defconfig: Remove QSPI Sector 4K size force (bsc#1051510).\n- arm: spear13xx: Fix dmas cells (bsc#1051510).\n- arm: sunxi_defconfig: Enable CMA (bsc#1051510).\n- arm: sunxi: fix the core number of V3s in sunxi README (bsc#1051510).\n- asoc: dpcm: do not merge format from invalid codec dai (bsc#1051510).\n- ASoC: dpcm: fix BE dai not hw_free and shutdown (bsc#1051510).\n- asoc: es7134: remove 64kHz rate from the supported rates (bsc#1051510).\n- asoc: rsnd: cmd: Add missing newline to debug message (bsc#1051510).\n- asoc: sirf: Fix potential NULL pointer dereference (bsc#1051510).\n- asoc: topology: Add missing clock gating parameter when parsing hw_configs (bsc#1051510).\n- asoc: topology: Fix bclk and fsync inversion in set_link_hw_format() (bsc#1051510).\n- asoc: zte: Fix incorrect PCM format bit usages (bsc#1051510).\n- ata: do not schedule hot plug if it is a sas host ().\n- ath: Add regulatory mapping for APL13_WORLD (bsc#1051510).\n- ath: Add regulatory mapping for APL2_FCCA (bsc#1051510).\n- ath: Add regulatory mapping for Bahamas (bsc#1051510).\n- ath: Add regulatory mapping for Bermuda (bsc#1051510).\n- ath: Add regulatory mapping for ETSI8_WORLD (bsc#1051510).\n- ath: Add regulatory mapping for FCC3_ETSIC (bsc#1051510).\n- ath: Add regulatory mapping for Serbia (bsc#1051510).\n- ath: Add regulatory mapping for Tanzania (bsc#1051510).\n- ath: Add regulatory mapping for Uganda (bsc#1051510).\n- audit: fix potential null dereference \u0027context-\u003emodule.name\u0027 (bsc#1051510).\n- backlight: pwm_bl: Do not use GPIOF_* with gpiod_get_direction (bsc#1051510).\n- bdi: Move cgroup bdi_writeback to a dedicated low concurrency workqueue (bsc#1101867).\n- be2net: gather debug info and reset adapter (only for Lancer) on a tx-timeout (bsc#1086288).\n- be2net: Update the driver version to 12.0.0.0 (bsc#1086288 ).\n- befs_lookup(): use d_splice_alias() (bsc#1101844).\n- block: Fix transfer when chunk sectors exceeds max (bsc#1101874).\n- Bluetooth: btusb: Add a new Realtek 8723DE ID 2ff8:b011 (bsc#1051510).\n- Bluetooth: btusb: add ID for LiteOn 04ca:301a (bsc#1051510).\n- Bluetooth: hci_qca: Fix \u0027Sleep inside atomic section\u0027 warning (bsc#1051510).\n- bpf, ppc64: fix unexpected r0=0 exit path inside bpf_xadd (bsc#1083647).\n- branch-check: fix long-\u003eint truncation when profiling branches (bsc#1101116,).\n- brcmfmac: Add support for bcm43364 wireless chipset (bsc#1051510).\n- cachefiles: Fix missing clear of the CACHEFILES_OBJECT_ACTIVE flag (bsc#1099858).\n- cachefiles: Fix refcounting bug in backing-file read monitoring (bsc#1099858).\n- cachefiles: Wait rather than BUG\u0027ing on \u0027Unexpected object collision\u0027 (bsc#1099858).\n- can: dev: increase bus-off message severity (bsc#1051510).\n- can: ems_usb: Fix memory leak on ems_usb_disconnect() (bsc#1051510).\n- can: m_can: change comparison to bitshift when dealing with a mask (bsc#1051510).\n- cdrom: do not call check_disk_change() inside cdrom_open() (bsc#1101872).\n- clk: at91: fix clk-generated compilation (bsc#1051510).\n- clk: renesas: cpg-mssr: Stop using printk format %pCr (bsc#1051510).\n- coccinelle: fix parallel build with CHECK=scripts/coccicheck (bsc#1051510).\n- compiler.h: enable builtin overflow checkers and add fallback code (bsc#1101116,).\n- cpufreq: intel_pstate: Limit the scope of HWP dynamic boost platforms (bsc#1066110).\n- cpu/hotplug: Make bringup/teardown of smp threads symmetric (bsc#1089343).\n- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).\n- cpu/hotplug: Split do_cpu_down() (bsc#1089343).\n- crypto: authenc - do not leak pointers to authenc keys (bsc#1051510).\n- crypto: authencesn - do not leak pointers to authenc keys (bsc#1051510).\n- crypto: padlock-aes - Fix Nano workaround data corruption (bsc#1051510).\n- delayacct: fix crash in delayacct_blkio_end() after delayacct init failure (bsc#1104066).\n- Delete patches.suse/0201-dax-dm-allow-device-mapper-to-operate-without-dax-su.patch (bsc#1103917).\n- disable PINCTRL_LEWISBURG\n- dm: add writecache target (bsc#1101116,).\n- dm: prevent DAX mounts if not supported (bsc#1103917).\n- dm writecache: support optional offset for start of device (bsc#1101116,).\n- dm writecache: use 2-factor allocator arguments (bsc#1101116,).\n- doc: Add vendor prefix for Kieback and Peter GmbH (bsc#1051510).\n- docs: zh_CN: fix location of oops-tracing.txt (bsc#1051510).\n- drivers: soc: sunxi: fix error processing on base address when claiming (bsc#1051510).\n- drm: Add DP PSR2 sink enable bit (bsc#1051510).\n- drm/amdgpu: Remove VRAM from shared bo domains (bsc#1051510).\n- drm/atomic: Check old_plane_state-\u003ecrtc in drm_atomic_helper_async_check() (bsc#1051510).\n- drm/atomic: Handling the case when setting old crtc for plane (bsc#1051510).\n- drm/atomic-helper: Drop plane-\u003efb references only for drm_atomic_helper_shutdown() (bsc#1051510).\n- drm/atomic: Initialize variables in drm_atomic_helper_async_check() to make gcc happy (bsc#1051510).\n- drm/atomic: Make async plane update checks work as intended, v2 (bsc#1051510).\n- drm/atomic: Make atomic helper track newly assigned planes correctly, v2 (bsc#1051510).\n- drm/atomic: Make atomic iterators less surprising (bsc#1051510).\n- drm/cirrus: Use drm_framebuffer_put to avoid kernel oops in clean-up (bsc#1101822).\n- drm/dp/mst: Fix off-by-one typo when dump payload table (bsc#1051510).\n- drm/gma500: fix psb_intel_lvds_mode_valid()\u0027s return type (bsc#1051510).\n- drm/nouveau/fifo/gk104-: poll for runlist update completion (bsc#1051510).\n- drm/radeon: fix mode_valid\u0027s return type (bsc#1051510).\n- drm: re-enable error handling (bsc#1051510).\n- drm/vc4: Reset -\u003e{x, y}_scaling[1] when dealing with uniplanar formats (bsc#1051510).\n- edac: Add missing MEM_LRDDR4 entry in edac_mem_types[] (bsc#1103886).\n- edac, altera: Fix ARM64 build warning (bsc#1051510).\n- edac: Drop duplicated array of strings for memory type names (bsc#1103886).\n- edac, mv64x60: Fix an error handling path (bsc#1051510).\n- edac, octeon: Fix an uninitialized variable warning (bsc#1051510).\n- edac, sb_edac: Fix missing break in switch (bsc#1051510).\n- ext2: fix a block leak (bsc#1101875).\n- ext4: add more mount time checks of the superblock (bsc#1101900).\n- ext4: bubble errors from ext4_find_inline_data_nolock() up to ext4_iget() (bsc#1101896).\n- ext4: check for allocation block validity with block group locked (bsc#1104495).\n- ext4: check superblock mapped prior to committing (bsc#1101902).\n- ext4: do not update s_last_mounted of a frozen fs (bsc#1101841).\n- ext4: factor out helper ext4_sample_last_mounted() (bsc#1101841).\n- ext4: fix check to prevent initializing reserved inodes (bsc#1104319).\n- ext4: fix false negatives *and* false positives in ext4_check_descriptors() (bsc#1103445).\n- ext4: fix fencepost error in check for inode count overflow during resize (bsc#1101853).\n- ext4: fix inline data updates with checksums enabled (bsc#1104494).\n- ext4: include the illegal physical block in the bad map ext4_error msg (bsc#1101903).\n- ext4: report delalloc reserve as non-free in statfs for project quota (bsc#1101843).\n- ext4: update mtime in ext4_punch_hole even if no blocks are released (bsc#1101895).\n- f2fs: call unlock_new_inode() before d_instantiate() (bsc#1101837).\n- fix io_destroy()/aio_complete() race (bsc#1101852).\n- Force log to disk before reading the AGF during a fstrim (bsc#1101893).\n- fs: allow per-device dax status checking for filesystems (bsc#1103917).\n- fscache: Allow cancelled operations to be enqueued (bsc#1099858).\n- fscache: Fix hanging wait on page discarded by writeback (bsc#1101885).\n- fscache: Fix reference overput in fscache_attach_object() error handling (bsc#1099858).\n- fs: clear writeback errors in inode_init_always (bsc#1101882).\n- fs: do not scan the inode cache before SB_BORN is set (bsc#1101883).\n- geneve: update skb dst pmtu on tx path (bsc#1051510).\n- genirq: Check __free_irq() return value for NULL (bsc#1103517).\n- genirq: Fix editing error in a comment (bsc#1051510).\n- genirq: Make force irq threading setup more robust (bsc#1051510).\n- gtp: Initialize 64-bit per-cpu stats correctly (bsc#1051510).\n- HID: hid-plantronics: Re-resend Update to map button for PTT products (bsc#1051510).\n- HID: i2c-hid: check if device is there before really probing (bsc#1051510).\n- hippi: Fix a Fix a possible sleep-in-atomic bug in rr_close (bsc#1051510).\n- hns3: fix unused function warning (bsc#1104353).\n- hns3pf: do not check handle during mqprio offload (bsc#1104353 ).\n- hns3pf: fix hns3_del_tunnel_port() (bsc#1104353).\n- hns3pf: Fix some harmless copy and paste bugs (bsc#1104353 ).\n- hv_netvsc: Ensure correct teardown message sequence order ().\n- hv/netvsc: fix handling of fallback to single queue mode ().\n- hv_netvsc: Fix napi reschedule while receive completion is busy.\n- hv_netvsc: Fix net device attach on older Windows hosts ().\n- hv/netvsc: Fix NULL dereference at single queue mode fallback (bsc#1104708).\n- hv_netvsc: set master device (bsc#1051979).\n- hv_netvsc: Split netvsc_revoke_buf() and netvsc_teardown_gpadl() ().\n- hv_netvsc: split sub-channel setup into async and sync ().\n- hv_netvsc: Use Windows version instead of NVSP version on GPAD teardown ().\n- hwmon: (asus_atk0110) Replace deprecated device register call (bsc#1103363).\n- i2c: imx: Fix reinit_completion() use (bsc#1051510).\n- IB/hns: Annotate iomem pointers correctly (bsc#1104427 ).\n- IB/hns: Avoid compile test under non 64bit environments (bsc#1104427).\n- IB/hns: Declare local functions \u0027static\u0027 (bsc#1104427 ).\n- IB/hns: fix boolreturn.cocci warnings (bsc#1104427).\n- IB/hns: Fix for checkpatch.pl comment style warnings (bsc#1104427).\n- IB/hns: fix memory leak on ah on error return path (bsc#1104427 ).\n- IB/hns: fix returnvar.cocci warnings (bsc#1104427).\n- IB/hns: fix semicolon.cocci warnings (bsc#1104427).\n- IB/hns: Fix the bug of polling cq failed for loopback Qps (bsc#1104427). \n- IB/hns: Fix the bug with modifying the MAC address without removing the driver (bsc#1104427).\n- IB/hns: Fix the bug with rdma operation (bsc#1104427 ).\n- IB/hns: Fix the bug with wild pointer when destroy rc qp (bsc#1104427).\n- IB/hns: include linux/interrupt.h (bsc#1104427).\n- IB/hns: Support compile test for hns RoCE driver (bsc#1104427 ).\n- IB/hns: Use zeroing memory allocator instead of allocator/memset (bsc#1104427).\n- ibmasm: do not write out of bounds in read handler (bsc#1051510).\n- ibmvnic: Remove code to request error information (bsc#1104174).\n- ibmvnic: Revise RX/TX queue error messages (bsc#1101331).\n- ibmvnic: Update firmware error reporting with cause string (bsc#1104174).\n- init: rename and re-order boot_cpu_state_init() (bsc#1104365).\n- Input: elan_i2c - add ACPI ID for lenovo ideapad 330 (bsc#1051510).\n- Input: elan_i2c - add another ACPI ID for Lenovo Ideapad 330-15AST (bsc#1051510).\n- Input: i8042 - add Lenovo LaVie Z to the i8042 reset list (bsc#1051510).\n- irqchip: brcmstb-l2: Define an irq_pm_shutdown function (bsc#1051510).\n- irqchip/gic: Take lock when updating irq type (bsc#1051510).\n- irqchip/gic-v3: Change pr_debug message to pr_devel (bsc#1051510).\n- irqchip/gic-v3: Fix the driver probe() fail due to disabled GICC entry (bsc#1051510).\n- irqchip/gic-v3: Ignore disabled ITS nodes (bsc#1051510).\n- irqchip/gic-v3: Use wmb() instead of smb_wmb() in gic_raise_softirq() (bsc#1051510).\n- irqchip/qcom: Fix check for spurious interrupts (bsc#1051510).\n- irqchip/qcom: Fix u32 comparison with value less than zero (bsc#1051510).\n- isofs: fix potential memory leak in mount option parsing (bsc#1101887).\n- iwlwifi: add more card IDs for 9000 series (bsc#1051510).\n- iwlwifi: pcie: fix race in Rx buffer allocator (bsc#1051510).\n- jump_label: Fix concurrent static_key_enable/disable() (bsc#1089343).\n- jump_label: Provide hotplug context variants (bsc#1089343).\n- jump_label: Reorder hotplug lock and jump_label_lock (bsc#1089343).\n- kabi protect bdev_dax_supported (bsc#1103917).\n- kabi protect struct ccw_device_private (bsc#1103421).\n- KABI protect structy ata_host (git-fixes).\n- kabi/severities: Allow kABI changes for kvm/x86 (except for kvm_x86_ops)\n- kabi/severities: do not complain on hisi_sas internal changes ().\n- kabi/severities: ignore qla2xxx as all symbols are internal\n- kabi/severities: ignore x86_kvm_ops; lttng-modules would have to be adjusted in case they depend on this particular change\n- kbuild: add \u0027-fno-stack-check\u0027 to kernel build options (bsc#1051510).\n- kbuild: Handle builtin dtb file names containing hyphens (bsc#1051510).\n- kbuild: pkg: use --transform option to prefix paths in tar (bsc#1051510).\n- kconfig: display recursive dependency resolution hint just once (bsc#1051510).\n- kmemleak: add scheduling point to kmemleak_scan() (bsc#1051510).\n- kthread, tracing: Do not expose half-written comm when creating kthreads (bsc#1104897).\n- KVM: SVM: Add pause filter threshold ().\n- KVM: SVM: Implement pause loop exit logic in SVM ().\n- KVM: VMX: Bring the common code to header file ().\n- KVM: VMX: Fix the module parameters for vmx ().\n- KVM: VMX: Remove ple_window_actual_max ().\n- libata: add refcounting to ata_host (git-fixes).\n- libata: ensure host is free\u0027d on error exit paths (git-fixes).\n- libnvdimm, dimm: fix dpa reservation vs uninitialized label area (git-fixes).\n- linvdimm, pmem: Preserve read-only setting for pmem devices (git-fixes).\n- MAINTAINERS: review Renesas DT bindings as well (bsc#1051510).\n- media: media-device: fix ioctl function types (bsc#1051510).\n- media: omap3isp: fix unbalanced dma_iommu_mapping (bsc#1051510).\n- media: rcar_jpu: Add missing clk_disable_unprepare() on error in jpu_open() (bsc#1051510).\n- media: rc: oops in ir_timer_keyup after device unplug (bsc#1090888).\n- media: saa7164: Fix driver name in debug output (bsc#1051510).\n- media: si470x: fix __be16 annotations (bsc#1051510).\n- media: siano: get rid of __le32/__le16 cast warnings (bsc#1051510).\n- media: tw686x: Fix incorrect vb2_mem_ops GFP flags (bsc#1051510).\n- media: videobuf2-core: do not call memop \u0027finish\u0027 when queueing (bsc#1051510).\n- mfd: cros_ec: Fail early if we cannot identify the EC (bsc#1051510).\n- mfd: fsl-imx25: Clean up irq settings during removal (bsc#1051510).\n- mfd: mxs-lradc: Fix error handling in mxs_lradc_probe() (bsc#1051510).\n- misc: pci_endpoint_test: Avoid triggering a BUG() (bsc#1051510).\n- mmc: dw_mmc: update actual clock for mmc debugfs (bsc#1051510).\n- mmc: pwrseq: Use kmalloc_array instead of stack VLA (bsc#1051510).\n- mm: fix __gup_device_huge vs unmap (bsc#1101839).\n- mm/kmemleak.c: make cond_resched() rate-limiting more efficient (bsc#1051510).\n- mwifiex: correct histogram data with appropriate index (bsc#1051510).\n- mwifiex: handle race during mwifiex_usb_disconnect (bsc#1051510).\n- net: hns3: Add a check for client instance init state (bsc#1104353).\n- net: hns3: add a mask initialization for mac_vlan table (bsc#1104353).\n- net: hns3: Add *Asserting Reset* mailbox message and handling in VF (bsc#1104353).\n- net: hns3: add Asym Pause support to phy default features (bsc#1104353).\n- net: hns3: Add dcb netlink interface for the support of DCB feature (bsc#1104353).\n- net: hns3: Add DCB support when interacting with network stack (bsc#1104353).\n- net: hns3: Add ethtool interface for vlan filter (bsc#1104353 ).\n- net: hns3: add ethtool_ops.get_channels support for VF (bsc#1104353).\n- net: hns3: add ethtool_ops.get_coalesce support to PF (bsc#1104353).\n- net: hns3: add ethtool_ops.set_coalesce support to PF (bsc#1104353).\n- net: hns3: add ethtool -p support for fiber port (bsc#1104353 ).\n- net: hns3: add ethtool related offload command (bsc#1104353 ).\n- net: hns3: Add Ethtool support to HNS3 driver (bsc#1104353 ).\n- net: hns3: add existence checking before adding unicast mac address (bsc#1104353).\n- net: hns3: add existence check when remove old uc mac address (bsc#1104353).\n- net: hns3: add feature check when feature changed (bsc#1104353 ).\n- net: hns3: add get_link support to VF (bsc#1104353).\n- net: hns3: add get/set_coalesce support to VF (bsc#1104353 ).\n- net: hns3: add handling vlan tag offload in bd (bsc#1104353 ).\n- net: hns3: Add hclge_dcb module for the support of DCB feature (bsc#1104353).\n- net: hns3: Add HNS3 Acceleration Engine and Compatibility Layer Support (bsc#1104353).\n- net: hns3: Add HNS3 driver to kernel build framework and MAINTAINERS (bsc#1104353).\n- net: hns3: Add hns3_get_handle macro in hns3 driver (bsc#1104353 ).\n- net: hns3: Add HNS3 IMP(Integrated Mgmt Proc) Cmd Interface Support (bsc#1104353).\n- net: hns3: Add HNS3 VF driver to kernel build framework (bsc#1104353).\n- net: hns3: Add HNS3 VF HCL(Hardware Compatibility Layer) Support (bsc#1104353).\n- net: hns3: Add HNS3 VF IMP(Integrated Management Proc) cmd interface (bsc#1104353).\n- net: hns3: add int_gl_idx setup for TX and RX queues (bsc#1104353).\n- net: hns3: add int_gl_idx setup for VF (bsc#1104353 ).\n- net: hns3: Add mac loopback selftest support in hns3 driver (bsc#1104353).\n- net: hns3: Add mailbox interrupt handling to PF driver (bsc#1104353).\n- net: hns3: Add mailbox support to PF driver (bsc#1104353 ).\n- net: hns3: Add mailbox support to VF driver (bsc#1104353 ).\n- net: hns3: add manager table initialization for hardware (bsc#1104353).\n- net: hns3: Add MDIO support to HNS3 Ethernet driver for hip08 SoC (bsc#1104353).\n- net: hns3: Add missing break in misc_irq_handle (bsc#1104353 ).\n- net: hns3: Add more packet size statisctics (bsc#1104353 ).\n- net: hns3: add MTU initialization for hardware (bsc#1104353 ).\n- net: hns3: add net status led support for fiber port (bsc#1104353).\n- net: hns3: add nic_client check when initialize roce base information (bsc#1104353).\n- net: hns3: add querying speed and duplex support to VF (bsc#1104353).\n- net: hns3: Add repeat address checking for setting mac address (bsc#1104353).\n- net: hns3: Add reset interface implementation in client (bsc#1104353).\n- net: hns3: Add reset process in hclge_main (bsc#1104353 ).\n- net: hns3: Add reset service task for handling reset requests (bsc#1104353).\n- net: hns3: add result checking for VF when modify unicast mac address (bsc#1104353).\n- net: hns3: Add some interface for the support of DCB feature (bsc#1104353).\n- net: hns3: Adds support for led locate command for copper port (bsc#1104353).\n- net: hns3: Add STRP_TAGP field support for hardware revision 0x21 (bsc#1104353).\n- net: hns3: Add support for dynamically buffer reallocation (bsc#1104353).\n- net: hns3: add support for ETHTOOL_GRXFH (bsc#1104353 ).\n- net: hns3: add support for get_regs (bsc#1104353).\n- net: hns3: Add support for IFF_ALLMULTI flag (bsc#1104353 ).\n- net: hns3: Add support for misc interrupt (bsc#1104353 ).\n- net: hns3: add support for nway_reset (bsc#1104353).\n- net: hns3: Add support for PFC setting in TM module (bsc#1104353 ).\n- net: hns3: Add support for port shaper setting in TM module (bsc#1104353).\n- net: hns3: add support for querying advertised pause frame by ethtool ethx (bsc#1104353).\n- net: hns3: add support for querying pfc puase packets statistic (bsc#1104353).\n- net: hns3: add support for set_link_ksettings (bsc#1104353 ).\n- net: hns3: add support for set_pauseparam (bsc#1104353 ).\n- net: hns3: add support for set_ringparam (bsc#1104353 ).\n- net: hns3: add support for set_rxnfc (bsc#1104353).\n- net: hns3: Add support for tx_accept_tag2 and tx_accept_untag2 config (bsc#1104353).\n- net: hns3: add support for VF driver inner interface hclgevf_ops.get_tqps_and_rss_info (bsc#1104353).\n- net: hns3: Add support of hardware rx-vlan-offload to HNS3 VF driver (bsc#1104353).\n- net: hns3: Add support of HNS3 Ethernet Driver for hip08 SoC (bsc#1104353).\n- net: hns3: Add support of .sriov_configure in HNS3 driver (bsc#1104353).\n- net: hns3: Add support of the HNAE3 framework (bsc#1104353 ).\n- net: hns3: Add support of TX Scheduler and Shaper to HNS3 driver (bsc#1104353).\n- net: hns3: Add support to change MTU in HNS3 hardware (bsc#1104353).\n- net: hns3: Add support to enable TX/RX promisc mode for H/W rev(0x21) (bsc#1104353).\n- net: hns3: add support to modify tqps number (bsc#1104353 ).\n- net: hns3: add support to query tqps number (bsc#1104353 ).\n- net: hns3: Add support to re-initialize the hclge device (bsc#1104353).\n- net: hns3: Add support to request VF Reset to PF (bsc#1104353 ).\n- net: hns3: Add support to reset the enet/ring mgmt layer (bsc#1104353).\n- net: hns3: add support to update flow control settings after autoneg (bsc#1104353).\n- net: hns3: Add tc-based TM support for sriov enabled port (bsc#1104353).\n- net: hns3: Add timeout process in hns3_enet (bsc#1104353 ).\n- net: hns3: Add VF Reset device state and its handling (bsc#1104353).\n- net: hns3: Add VF Reset Service Task to support event handling (bsc#1104353).\n- net: hns3: add vlan offload config command (bsc#1104353 ).\n- net: hns3: change GL update rate (bsc#1104353).\n- net: hns3: Change PF to add ring-vect binding and resetQ to mailbox (bsc#1104353).\n- net: hns3: Change return type of hnae3_register_ae_algo (bsc#1104353).\n- net: hns3: Change return type of hnae3_register_ae_dev (bsc#1104353).\n- net: hns3: Change return value in hnae3_register_client (bsc#1104353).\n- net: hns3: Changes required in PF mailbox to support VF reset (bsc#1104353).\n- net: hns3: Changes to make enet watchdog timeout func common for PF/VF (bsc#1104353).\n- net: hns3: Changes to support ARQ(Asynchronous Receive Queue) (bsc#1104353).\n- net: hns3: change the returned tqp number by ethtool -x (bsc#1104353).\n- net: hns3: change the time interval of int_gl calculating (bsc#1104353).\n- net: hns3: change the unit of GL value macro (bsc#1104353 ).\n- net: hns3: change TM sched mode to TC-based mode when SRIOV enabled (bsc#1104353).\n- net: hns3: check for NULL function pointer in hns3_nic_set_features (bsc#1104353).\n- net: hns3: Cleanup for endian issue in hns3 driver (bsc#1104353 ).\n- net: hns3: Cleanup for non-static function in hns3 driver (bsc#1104353).\n- net: hns3: Cleanup for ROCE capability flag in ae_dev (bsc#1104353).\n- net: hns3: Cleanup for shifting true in hns3 driver (bsc#1104353 ).\n- net: hns3: Cleanup for struct that used to send cmd to firmware (bsc#1104353).\n- net: hns3: Cleanup indentation for Kconfig in the the hisilicon folder (bsc#1104353).\n- net: hns3: cleanup mac auto-negotiation state query (bsc#1104353 ).\n- net: hns3: cleanup mac auto-negotiation state query in hclge_update_speed_duplex (bsc#1104353).\n- net: hns3: cleanup of return values in hclge_init_client_instance() (bsc#1104353).\n- net: hns3: Clear TX/RX rings when stopping port and un-initializing client (bsc#1104353).\n- net: hns3: Consistently using GENMASK in hns3 driver (bsc#1104353).\n- net: hns3: converting spaces into tabs to avoid checkpatch.pl warning (bsc#1104353).\n- net: hns3: Disable VFs change rxvlan offload status (bsc#1104353 ).\n- net: hns3: Disable vf vlan filter when vf vlan table is full (bsc#1104353).\n- net: hns3: ensure media_type is unitialized (bsc#1104353 ).\n- net: hns3: export pci table of hclge and hclgevf to userspace (bsc#1104353).\n- net: hns3: fix a bug about hns3_clean_tx_ring (bsc#1104353 ).\n- net: hns3: fix a bug for phy supported feature initialization (bsc#1104353).\n- net: hns3: fix a bug in hclge_uninit_client_instance (bsc#1104353).\n- net: hns3: fix a bug in hns3_driv_to_eth_caps (bsc#1104353 ).\n- net: hns3: fix a bug when alloc new buffer (bsc#1104353 ).\n- net: hns3: fix a bug when getting phy address from NCL_config file (bsc#1104353).\n- net: hns3: fix a dead loop in hclge_cmd_csq_clean (bsc#1104353 ).\n- net: hns3: fix a handful of spelling mistakes (bsc#1104353 ).\n- net: hns3: Fix a loop index error of tqp statistics query (bsc#1104353).\n- net: hns3: Fix a misuse to devm_free_irq (bsc#1104353 ).\n- net: hns3: Fix an error handling path in \u0027hclge_rss_init_hw()\u0027 (bsc#1104353).\n- net: hns3: Fix an error macro definition of HNS3_TQP_STAT (bsc#1104353).\n- net: hns3: Fix an error of total drop packet statistics (bsc#1104353).\n- net: hns3: Fix a response data read error of tqp statistics query (bsc#1104353).\n- net: hns3: fix endian issue when PF get mbx message flag (bsc#1104353).\n- net: hns3: fix error type definition of return value (bsc#1104353).\n- net: hns3: Fixes API to fetch ethernet header length with kernel default (bsc#1104353).\n- net: hns3: Fixes error reported by Kbuild and internal review (bsc#1104353).\n- net: hns3: Fixes initalization of RoCE handle and makes it conditional (bsc#1104353).\n- net: hns3: Fixes initialization of phy address from firmware (bsc#1104353).\n- net: hns3: Fixes kernel panic issue during rmmod hns3 driver (bsc#1104353).\n- net: hns3: Fixes ring-to-vector map-and-unmap command (bsc#1104353).\n- net: hns3: Fixes the back pressure setting when sriov is enabled (bsc#1104353).\n- net: hns3: Fixes the command used to unmap ring from vector (bsc#1104353).\n- net: hns3: Fixes the default VLAN-id of PF (bsc#1104353 ).\n- net: hns3: Fixes the error legs in hclge_init_ae_dev function (bsc#1104353).\n- net: hns3: Fixes the ether address copy with appropriate API (bsc#1104353).\n- net: hns3: Fixes the initialization of MAC address in hardware (bsc#1104353).\n- net: hns3: Fixes the init of the VALID BD info in the descriptor (bsc#1104353).\n- net: hns3: Fixes the missing PCI iounmap for various legs (bsc#1104353).\n- net: hns3: Fixes the missing u64_stats_fetch_begin_irq in 64-bit stats fetch (bsc#1104353).\n- net: hns3: Fixes the out of bounds access in hclge_map_tqp (bsc#1104353).\n- net: hns3: Fixes the premature exit of loop when matching clients (bsc#1104353).\n- net: hns3: fixes the ring index in hns3_fini_ring (bsc#1104353 ).\n- net: hns3: Fixes the state to indicate client-type initialization (bsc#1104353).\n- net: hns3: Fixes the static checker error warning in hns3_get_link_ksettings() (bsc#1104353).\n- net: hns3: Fixes the static check warning due to missing unsupp L3 proto check (bsc#1104353).\n- net: hns3: Fixes the wrong IS_ERR check on the returned phydev value (bsc#1104353).\n- net: hns3: fix for buffer overflow smatch warning (bsc#1104353 ).\n- net: hns3: fix for changing MTU (bsc#1104353).\n- net: hns3: fix for cleaning ring problem (bsc#1104353 ).\n- net: hns3: Fix for CMDQ and Misc. interrupt init order problem (bsc#1104353).\n- net: hns3: fix for coal configuation lost when setting the channel (bsc#1104353).\n- net: hns3: fix for coalesce configuration lost during reset (bsc#1104353).\n- net: hns3: Fix for deadlock problem occurring when unregistering ae_algo (bsc#1104353).\n- net: hns3: Fix for DEFAULT_DV when dev does not support DCB (bsc#1104353).\n- net: hns3: Fix for fiber link up problem (bsc#1104353 ).\n- net: hns3: fix for getting advertised_caps in hns3_get_link_ksettings (bsc#1104353).\n- net: hns3: fix for getting autoneg in hns3_get_link_ksettings (bsc#1104353).\n- net: hns3: fix for getting auto-negotiation state in hclge_get_autoneg (bsc#1104353).\n- net: hns3: fix for getting wrong link mode problem (bsc#1104353 ).\n- net: hns3: Fix for hclge_reset running repeatly problem (bsc#1104353).\n- net: hns3: Fix for hns3 module is loaded multiple times problem (bsc#1104353).\n- net: hns3: fix for ipv6 address loss problem after setting channels (bsc#1104353).\n- net: hns3: fix for loopback failure when vlan filter is enable (bsc#1104353).\n- net: hns3: fix for netdev not running problem after calling net_stop and net_open (bsc#1104353).\n- net: hns3: Fix for netdev not running problem after calling net_stop and net_open (bsc#1104353).\n- net: hns3: fix for not initializing VF rss_hash_key problem (bsc#1104353).\n- net: hns3: fix for not returning problem in get_link_ksettings when phy exists (bsc#1104353).\n- net: hns3: fix for not setting pause parameters (bsc#1104353 ).\n- net: hns3: Fix for not setting rx private buffer size to zero (bsc#1104353).\n- net: hns3: Fix for packet loss due wrong filter config in VLAN tbls (bsc#1104353).\n- net: hns3: fix for pause configuration lost during reset (bsc#1104353).\n- net: hns3: Fix for PF mailbox receving unknown message (bsc#1104353).\n- net: hns3: fix for phy_addr error in hclge_mac_mdio_config (bsc#1104353).\n- net: hns3: Fix for phy not link up problem after resetting (bsc#1104353).\n- net: hns3: Fix for pri to tc mapping in TM (bsc#1104353 ).\n- net: hns3: fix for returning wrong value problem in hns3_get_rss_indir_size (bsc#1104353).\n- net: hns3: fix for returning wrong value problem in hns3_get_rss_key_size (bsc#1104353).\n- net: hns3: fix for RSS configuration loss problem during reset (bsc#1104353).\n- net: hns3: Fix for rx priv buf allocation when DCB is not supported (bsc#1104353).\n- net: hns3: Fix for rx_priv_buf_alloc not setting rx shared buffer (bsc#1104353).\n- net: hns3: Fix for service_task not running problem after resetting (bsc#1104353).\n- net: hns3: Fix for setting mac address when resetting (bsc#1104353).\n- net: hns3: fix for setting MTU (bsc#1104353).\n- net: hns3: Fix for setting rss_size incorrectly (bsc#1104353 ).\n- net: hns3: Fix for the null pointer problem occurring when initializing ae_dev failed (bsc#1104353).\n- net: hns3: fix for the wrong shift problem in hns3_set_txbd_baseinfo (bsc#1104353).\n- net: hns3: fix for updating fc_mode_last_time (bsc#1104353 ).\n- net: hns3: fix for use-after-free when setting ring parameter (bsc#1104353).\n- net: hns3: Fix for VF mailbox cannot receiving PF response (bsc#1104353).\n- net: hns3: Fix for VF mailbox receiving unknown message (bsc#1104353).\n- net: hns3: fix for vlan table lost problem when resetting (bsc#1104353).\n- net: hns3: Fix for vxlan tx checksum bug (bsc#1104353 ).\n- net: hns3: Fix initialization when cmd is not supported (bsc#1104353).\n- net: hns3: fix length overflow when CONFIG_ARM64_64K_PAGES (bsc#1104353).\n- net: hns3: fix null pointer dereference before null check (bsc#1104353).\n- net: hns3: fix return value error of hclge_get_mac_vlan_cmd_status() (bsc#1104353).\n- net: hns3: fix rx path skb-\u003etruesize reporting bug (bsc#1104353 ).\n- net: hns3: Fix setting mac address error (bsc#1104353 ).\n- net: hns3: Fix spelling errors (bsc#1104353).\n- net: hns3: fix spelling mistake: \u0027capabilty\u0027 -\u003e \u0027capability\u0027 (bsc#1104353).\n- net: hns3: fix the bug of hns3_set_txbd_baseinfo (bsc#1104353 ).\n- net: hns3: fix the bug when map buffer fail (bsc#1104353 ).\n- net: hns3: fix the bug when reuse command description in hclge_add_mac_vlan_tbl (bsc#1104353).\n- net: hns3: Fix the missing client list node initialization (bsc#1104353).\n- net: hns3: fix the ops check in hns3_get_rxnfc (bsc#1104353 ).\n- net: hns3: fix the queue id for tqp enable and reset (bsc#1104353 ).\n- net: hns3: fix the ring count for ETHTOOL_GRXRINGS (bsc#1104353 ).\n- net: hns3: fix the TX/RX ring.queue_index in hns3_ring_get_cfg (bsc#1104353).\n- net: hns3: fix the VF queue reset flow error (bsc#1104353 ).\n- net: hns3: fix to correctly fetch l4 protocol outer header (bsc#1104353).\n- net: hns3: Fix to support autoneg only for port attached with phy (bsc#1104353).\n- net: hns3: Fix typo error for feild in hclge_tm (bsc#1104353 ).\n- net: hns3: free the ring_data structrue when change tqps (bsc#1104353).\n- net: hns3: get rss_size_max from configuration but not hardcode (bsc#1104353).\n- net: hns3: get vf count by pci_sriov_get_totalvfs (bsc#1104353 ).\n- net: hns3: hclge_inform_reset_assert_to_vf() can be static (bsc#1104353).\n- net: hns3: hns3:fix a bug about statistic counter in reset process (bsc#1104353).\n- net: hns3: hns3_get_channels() can be static (bsc#1104353 ).\n- net: hns3: Increase the default depth of bucket for TM shaper (bsc#1104353).\n- net: hns3: increase the max time for IMP handle command (bsc#1104353).\n- net: hns3: make local functions static (bsc#1104353 ).\n- net: hns3: Mask the packet statistics query when NIC is down (bsc#1104353).\n- net: hns3: Modify the update period of packet statistics (bsc#1104353).\n- net: hns3: never send command queue message to IMP when reset (bsc#1104353).\n- net: hns3: Optimize PF CMDQ interrupt switching process (bsc#1104353).\n- net: hns3: Optimize the PF\u0027s process of updating multicast MAC (bsc#1104353).\n- net: hns3: Optimize the VF\u0027s process of updating multicast MAC (bsc#1104353).\n- net: hns3: reallocate tx/rx buffer after changing mtu (bsc#1104353).\n- net: hns3: refactor GL update function (bsc#1104353 ).\n- net: hns3: refactor interrupt coalescing init function (bsc#1104353).\n- net: hns3: Refactor mac_init function (bsc#1104353).\n- net: hns3: Refactor of the reset interrupt handling logic (bsc#1104353).\n- net: hns3: Refactors the requested reset and pending reset handling code (bsc#1104353).\n- net: hns3: refactor the coalesce related struct (bsc#1104353 ).\n- net: hns3: refactor the get/put_vector function (bsc#1104353 ).\n- net: hns3: refactor the hclge_get/set_rss function (bsc#1104353 ).\n- net: hns3: refactor the hclge_get/set_rss_tuple function (bsc#1104353).\n- net: hns3: Refactor the initialization of command queue (bsc#1104353).\n- net: hns3: refactor the loopback related function (bsc#1104353 ).\n- net: hns3: Refactor the mapping of tqp to vport (bsc#1104353 ).\n- net: hns3: Refactor the skb receiving and transmitting function (bsc#1104353).\n- net: hns3: remove a couple of redundant assignments (bsc#1104353 ).\n- net: hns3: remove add/del_tunnel_udp in hns3_enet module (bsc#1104353).\n- net: hns3: Remove a useless member of struct hns3_stats (bsc#1104353).\n- net: hns3: Remove error log when getting pfc stats fails (bsc#1104353).\n- net: hns3: Remove packet statistics in the range of 8192~12287 (bsc#1104353).\n- net: hns3: remove redundant memset when alloc buffer (bsc#1104353).\n- net: hns3: remove redundant semicolon (bsc#1104353).\n- net: hns3: Remove repeat statistic of rx_errors (bsc#1104353 ).\n- net: hns3: Removes unnecessary check when clearing TX/RX rings (bsc#1104353).\n- net: hns3: remove TSO config command from VF driver (bsc#1104353 ).\n- net: hns3: remove unnecessary pci_set_drvdata() and devm_kfree() (bsc#1104353).\n- net: hns3: remove unused GL setup function (bsc#1104353 ).\n- net: hns3: remove unused hclgevf_cfg_func_mta_filter (bsc#1104353).\n- net: hns3: Remove unused led control code (bsc#1104353 ).\n- net: hns3: report the function type the same line with hns3_nic_get_stats64 (bsc#1104353).\n- net: hns3: set the cmdq out_vld bit to 0 after used (bsc#1104353 ).\n- net: hns3: set the max ring num when alloc netdev (bsc#1104353 ).\n- net: hns3: Setting for fc_mode and dcb enable flag in TM module (bsc#1104353).\n- net: hns3: Support for dynamically assigning tx buffer to TC (bsc#1104353).\n- net: hns3: Unified HNS3 {VF|PF} Ethernet Driver for hip08 SoC (bsc#1104353).\n- net: hns3: unify the pause params setup function (bsc#1104353 ).\n- net: hns3: Unify the strings display of packet statistics (bsc#1104353).\n- net: hns3: Updates MSI/MSI-X alloc/free APIs(depricated) to new APIs (bsc#1104353).\n- net: hns3: Updates RX packet info fetch in case of multi BD (bsc#1104353).\n- net: hns3: Use enums instead of magic number in hclge_is_special_opcode (bsc#1104353).\n- net: hns3: VF should get the real rss_size instead of rss_size_max (bsc#1104353).\n- net: lan78xx: Fix race in tx pending skb size calculation (bsc#1100132).\n- net: lan78xx: fix rx handling before first packet is send (bsc#1100132).\n- net: qmi_wwan: add BroadMobi BM806U 2020:2033 (bsc#1087092).\n- net: qmi_wwan: Add Netgear Aircard 779S (bsc#1090888).\n- net-usb: add qmi_wwan if on lte modem wistron neweb d18q1 (bsc#1087092).\n- net: usb: asix: replace mii_nway_restart in resume path (bsc#1100132).\n- nohz: Fix local_timer_softirq_pending() (bsc#1051510).\n- nvme: ensure forward progress during Admin passthru (git-fixes).\n- nvme-fabrics: Ignore nr_io_queues option for discovery controllers (bsc#1102633).\n- nvme: fixup crash on failed discovery (bsc#1103920).\n- nvme.h: fixup ANA group descriptor format (bsc#1104111).\n- nvme: use hw qid in trace events (bsc#1102633).\n- orangefs: report attributes_mask and attributes for statx (bsc#1101832).\n- orangefs: set i_size on new symlink (bsc#1101845).\n- overflow.h: Add allocation size calculation helpers (bsc#1101116,).\n- PCI: pciehp: Assume NoCompl+ for Thunderbolt ports (bsc#1051510).\n- PCI: pciehp: Request control of native hotplug only if supported (bsc#1051510).\n- PCI: Prevent sysfs disable of device while driver is attached (bsc#1051510).\n- pinctrl: at91-pio4: add missing of_node_put (bsc#1051510).\n- pinctrl: cannonlake: Fix community ordering for H variant (bsc#1051510).\n- pinctrl: core: Return selector to the pinctrl driver (bsc#1051510).\n- pinctrl: freescale: off by one in imx1_pinconf_group_dbg_show() (bsc#1051510).\n- pinctrl: imx: off by one in imx_pinconf_group_dbg_show() (bsc#1051510).\n- pinctrl: intel: Add Intel Lewisburg GPIO support ().\n- pinctrl: nand: meson-gxl: fix missing data pins (bsc#1051510).\n- pinctrl: pinmux: Return selector to the pinctrl driver (bsc#1051510).\n- pinctrl: qcom: spmi-gpio: Fix pmic_gpio_config_get() to be compliant (bsc#1051510).\n- pinctrl: single: Fix group and function selector use (bsc#1051510).\n- PM / devfreq: rk3399_dmc: Fix duplicated opp table on reload (bsc#1051510).\n- pmem: only set QUEUE_FLAG_DAX for fsdax mode (bsc#1103917).\n- powerpc/64: Add GENERIC_CPU support for little endian ().\n- powerpc/fadump: handle crash memory ranges array index overflow (bsc#1103269).\n- powerpc/fadump: merge adjacent memory ranges to reduce PT_LOAD segements (bsc#1103269).\n- powerpc/pkeys: Deny read/write/execute by default (bsc#1097577).\n- powerpc/pkeys: Fix calculation of total pkeys (bsc#1097577).\n- powerpc/pkeys: Give all threads control of their key permissions (bsc#1097577).\n- powerpc/pkeys: key allocation/deallocation must not change pkey registers (bsc#1097577).\n- powerpc/pkeys: make protection key 0 less special (bsc#1097577).\n- powerpc/pkeys: Preallocate execute-only key (bsc#1097577).\n- powerpc/pkeys: Save the pkey registers before fork (bsc#1097577).\n- qed*: Add link change count value to ethtool statistics display (bsc#1086314).\n- qed: Add qed APIs for PHY module query (bsc#1086314 ).\n- qed: Add srq core support for RoCE and iWARP (bsc#1086314 ).\n- qede: Add driver callbacks for eeprom module query (bsc#1086314 ).\n- qedf: Add get_generic_tlv_data handler (bsc#1086317).\n- qedf: Add support for populating ethernet TLVs (bsc#1086317).\n- qed: fix spelling mistake \u0027successffuly\u0027 -\u003e \u0027successfully\u0027 (bsc#1086314).\n- qedi: Add get_generic_tlv_data handler (bsc#1086315).\n- qedi: Add support for populating ethernet TLVs (bsc#1086315).\n- qed: Make some functions static (bsc#1086314).\n- qed: remove redundant functions qed_get_cm_pq_idx_rl (bsc#1086314).\n- qed: remove redundant functions qed_set_gft_event_id_cm_hdr (bsc#1086314).\n- qed: remove redundant pointer \u0027name\u0027 (bsc#1086314).\n- qed: use dma_zalloc_coherent instead of allocator/memset (bsc#1086314).\n- qed*: Utilize FW 8.37.2.0 (bsc#1086314).\n- RDMA/hns: Add 64KB page size support for hip08 (bsc#1104427 ).\n- RDMA/hns: Add command queue support for hip08 RoCE driver (bsc#1104427).\n- RDMA/hns: Add CQ operations support for hip08 RoCE driver (bsc#1104427).\n- RDMA/hns: Add detailed comments for mb() call (bsc#1104427 ).\n- RDMA/hns: Add eq support of hip08 (bsc#1104427).\n- RDMA/hns: Add gsi qp support for modifying qp in hip08 (bsc#1104427).\n- RDMA/hns: Add mailbox\u0027s implementation for hip08 RoCE driver (bsc#1104427).\n- RDMA/hns: Add modify CQ support for hip08 (bsc#1104427 ).\n- RDMA/hns: Add names to function arguments in function pointers (bsc#1104427).\n- RDMA/hns: Add profile support for hip08 driver (bsc#1104427 ).\n- RDMA/hns: Add QP operations support for hip08 SoC (bsc#1104427 ).\n- RDMA/hns: Add releasing resource operation in error branch (bsc#1104427).\n- RDMA/hns: Add rereg mr support for hip08 (bsc#1104427 ).\n- RDMA/hns: Add reset process for RoCE in hip08 (bsc#1104427 ).\n- RDMA/hns: Add return operation when configured global param fail (bsc#1104427).\n- RDMA/hns: Add rq inline data support for hip08 RoCE (bsc#1104427 ).\n- RDMA/hns: Add rq inline flags judgement (bsc#1104427 ).\n- RDMA/hns: Add sq_invld_flg field in QP context (bsc#1104427 ).\n- RDMA/hns: Add support for processing send wr and receive wr (bsc#1104427).\n- RDMA/hns: Add the interfaces to support multi hop addressing for the contexts in hip08 (bsc#1104427).\n- RDMA/hns: Adjust the order of cleanup hem table (bsc#1104427 ).\n- RDMA/hns: Assign dest_qp when deregistering mr (bsc#1104427 ).\n- RDMA/hns: Assign the correct value for tx_cqn (bsc#1104427 ).\n- RDMA/hns: Assign zero for pkey_index of wc in hip08 (bsc#1104427 ).\n- RDMA/hns: Avoid NULL pointer exception (bsc#1104427 ).\n- RDMA/hns: Bugfix for cq record db for kernel (bsc#1104427 ).\n- RDMA/hns: Bugfix for init hem table (bsc#1104427).\n- RDMA/hns: Bugfix for rq record db for kernel (bsc#1104427 ).\n- RDMA/hns: Check return value of kzalloc (bsc#1104427 ).\n- RDMA/hns: Configure BT BA and BT attribute for the contexts in hip08 (bsc#1104427).\n- RDMA/hns: Configure fence attribute in hip08 RoCE (bsc#1104427 ).\n- RDMA/hns: Configure mac and gid and user access region for hip08 RoCE driver (bsc#1104427).\n- RDMA/hns: Configure sgid type for hip08 RoCE (bsc#1104427 ).\n- RDMA/hns: Configure the MTPT in hip08 (bsc#1104427).\n- RDMA/hns: Configure TRRL field in hip08 RoCE device (bsc#1104427 ).\n- RDMA/hns: Create gsi qp in hip08 (bsc#1104427).\n- RDMA/hns: Delete the unnecessary initializing enum to zero (bsc#1104427).\n- RDMA/hns: Do not unregister a callback we didn\u0027t register (bsc#1104427).\n- RDMA/hns: Drop local zgid in favor of core defined variable (bsc#1104427).\n- RDMA/hns: Enable inner_pa_vld filed of mpt (bsc#1104427 ).\n- RDMA/hns: Enable the cqe field of sqwqe of RC (bsc#1104427 ).\n- RDMA/hns: ensure for-loop actually iterates and free\u0027s buffers (bsc#1104427).\n- RDMA/hns: Fill sq wqe context of ud type in hip08 (bsc#1104427 ).\n- RDMA/hns: Filter for zero length of sge in hip08 kernel mode (bsc#1104427).\n- RDMA/hns: Fix a bug with modifying mac address (bsc#1104427 ).\n- RDMA/hns: Fix a couple misspellings (bsc#1104427).\n- RDMA/hns: Fix calltrace for sleeping in atomic (bsc#1104427 ).\n- RDMA/hns: Fix cqn type and init resp (bsc#1104427).\n- RDMA/hns: Fix cq record doorbell enable in kernel (bsc#1104427 ).\n- RDMA/hns: Fix endian problems around imm_data and rkey (bsc#1104427).\n- RDMA/hns: Fix inconsistent warning (bsc#1104427).\n- RDMA/hns: Fix init resp when alloc ucontext (bsc#1104427 ).\n- RDMA/hns: Fix misplaced call to hns_roce_cleanup_hem_table (bsc#1104427).\n- RDMA/hns: Fix QP state judgement before receiving work requests (bsc#1104427).\n- RDMA/hns: Fix QP state judgement before sending work requests (bsc#1104427).\n- RDMA/hns: fix spelling mistake: \u0027Reseved\u0027 -\u003e \u0027Reserved\u0027 (bsc#1104427).\n- RDMA/hns: Fix the bug with NULL pointer (bsc#1104427 ).\n- RDMA/hns: Fix the bug with rq sge (bsc#1104427).\n- RDMA/hns: Fix the endian problem for hns (bsc#1104427 ).\n- RDMA/hns: Fix the illegal memory operation when cross page (bsc#1104427).\n- RDMA/hns: Fix the issue of IOVA not page continuous in hip08 (bsc#1104427).\n- RDMA/hns: Fix the qp context state diagram (bsc#1104427 ).\n- RDMA/hns: Generate gid type of RoCEv2 (bsc#1104427).\n- RDMA/hns: Get rid of page operation after dma_alloc_coherent (bsc#1104427).\n- RDMA/hns: Get rid of virt_to_page and vmap calls after dma_alloc_coherent (bsc#1104427).\n- RDMA/hns: Implement the disassociate_ucontext API (bsc#1104427 ).\n- RDMA/hns: Increase checking CMQ status timeout value (bsc#1104427).\n- RDMA/hns: Initialize the PCI device for hip08 RoCE (bsc#1104427 ).\n- RDMA/hns: Intercept illegal RDMA operation when use inline data (bsc#1104427).\n- RDMA/hns: Load the RoCE dirver automatically (bsc#1104427 ).\n- RDMA/hns: make various function static, fixes warnings (bsc#1104427).\n- RDMA/hns: Modify assignment device variable to support both PCI device and platform device (bsc#1104427).\n- RDMA/hns: Modify the usage of cmd_sn in hip08 (bsc#1104427 ).\n- RDMA/hns: Modify the value with rd dest_rd of qp_attr (bsc#1104427).\n- RDMA/hns: Modify uar allocation algorithm to avoid bitmap exhaust (bsc#1104427).\n- RDMA/hns: Move priv in order to add multiple hns_roce support (bsc#1104427).\n- RDMA/hns: Move the location for initializing tmp_len (bsc#1104427).\n- RDMA/hns: Not support qp transition from reset to reset for hip06 (bsc#1104427).\n- RDMA/hns: Only assign dest_qp if IB_QP_DEST_QPN bit is set (bsc#1104427).\n- RDMA/hns: Only assign dqpn if IB_QP_PATH_DEST_QPN bit is set (bsc#1104427).\n- RDMA/hns: Only assign mtu if IB_QP_PATH_MTU bit is set (bsc#1104427).\n- RDMA/hns: Refactor code for readability (bsc#1104427 ).\n- RDMA/hns: Refactor eq code for hip06 (bsc#1104427).\n- RDMA/hns: remove redundant assignment to variable j (bsc#1104427 ).\n- RDMA/hns: Remove some unnecessary attr_mask judgement (bsc#1104427).\n- RDMA/hns: Remove unnecessary operator (bsc#1104427).\n- RDMA/hns: Remove unnecessary platform_get_resource() error check (bsc#1104427).\n- RDMA/hns: Rename the idx field of db (bsc#1104427).\n- RDMA/hns: Replace condition statement using hardware version information (bsc#1104427).\n- RDMA/hns: Replace __raw_write*(cpu_to_le*()) with LE write*() (bsc#1104427).\n- RDMA/hns: return 0 rather than return a garbage status value (bsc#1104427).\n- RDMA/hns_roce: Do not check return value of zap_vma_ptes() (bsc#1104427).\n- RDMA/hns: Set access flags of hip08 RoCE (bsc#1104427 ).\n- RDMA/hns: Set desc_dma_addr for zero when free cmq desc (bsc#1104427).\n- RDMA/hns: Set NULL for __internal_mr (bsc#1104427).\n- RDMA/hns: Set rdma_ah_attr type for querying qp (bsc#1104427 ).\n- RDMA/hns: Set se attribute of sqwqe in hip08 (bsc#1104427 ).\n- RDMA/hns: Set sq_cur_sge_blk_addr field in QPC in hip08 (bsc#1104427).\n- RDMA/hns: Set the guid for hip08 RoCE device (bsc#1104427 ).\n- RDMA/hns: Set the owner field of SQWQE in hip08 RoCE (bsc#1104427).\n- RDMA/hns: Split CQE from MTT in hip08 (bsc#1104427).\n- RDMA/hns: Split hw v1 driver from hns roce driver (bsc#1104427 ).\n- RDMA/hns: Submit bad wr (bsc#1104427).\n- RDMA/hns: Support cq record doorbell for kernel space (bsc#1104427).\n- RDMA/hns: Support cq record doorbell for the user space (bsc#1104427).\n- RDMA/hns: Support multi hop addressing for PBL in hip08 (bsc#1104427).\n- RDMA/hns: Support rq record doorbell for kernel space (bsc#1104427).\n- RDMA/hns: Support rq record doorbell for the user space (bsc#1104427).\n- RDMA/hns: Support WQE/CQE/PBL page size configurable feature in hip08 (bsc#1104427).\n- RDMA/hns: Unify the calculation for hem index in hip08 (bsc#1104427).\n- RDMA/hns: Update assignment method for owner field of send wqe (bsc#1104427).\n- RDMA/hns: Update calculation of irrl_ba field for hip08 (bsc#1104427).\n- RDMA/hns: Update convert function of endian format (bsc#1104427 ).\n- RDMA/hns: Update the interfaces for MTT/CQE multi hop addressing in hip08 (bsc#1104427).\n- RDMA/hns: Update the IRRL table chunk size in hip08 (bsc#1104427 ).\n- RDMA/hns: Update the PD CQE MTT specification in hip08 (bsc#1104427).\n- RDMA/hns: Update the usage of ack timeout in hip08 (bsc#1104427 ).\n- RDMA/hns: Update the usage of sr_max and rr_max field (bsc#1104427).\n- RDMA/hns: Update the verbs of polling for completion (bsc#1104427).\n- RDMA/hns: Use free_pages function instead of free_page (bsc#1104427).\n- RDMA/hns: Use structs to describe the uABI instead of opencoding (bsc#1104427).\n- RDMA/qedr: Fix NULL pointer dereference when running over iWARP without RDMA-CM (bsc#1086314).\n- RDMA/qedr: fix spelling mistake: \u0027adrresses\u0027 -\u003e \u0027addresses\u0027 (bsc#1086314).\n- RDMA/qedr: fix spelling mistake: \u0027failes\u0027 -\u003e \u0027fails\u0027 (bsc#1086314).\n- regulator: pfuze100: add .is_enable() for pfuze100_swb_regulator_ops (bsc#1051510).\n- reiserfs: fix buffer overflow with long warning messages (bsc#1101847).\n- Revert \u0027drm/nouveau/drm/therm/fan: add a fallback if no fan control is specified in the vbios\u0027 (bsc#1103356).\n- rtc: ensure rtc_set_alarm fails when alarms are not supported (bsc#1051510).\n- s390/cio: clear timer when terminating driver I/O (bsc#1103421).\n- s390/cio: fix return code after missing interrupt (bsc#1103421).\n- s390/dasd: configurable IFCC handling (bsc#1097808).\n- s390/dasd: fix handling of internal requests (bsc#1103421).\n- s390/dasd: fix wrongly assigned configuration data (bsc#1103421).\n- s390/dasd: prevent prefix I/O error (bsc#1103421).\n- s390/eadm: fix CONFIG_BLOCK include dependency (bsc#1103421).\n- s390/ipl: ensure loadparm valid flag is set (bsc#1103421).\n- s390/pci: do not require AIS facility (bsc#1103421).\n- s390/qdio: do not release memory in qdio_setup_irq() (bsc#1103421).\n- sc16is7xx: Check for an error when the clock is enabled (bsc#1051510).\n- sched/debug: Reverse the order of printing faults (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Consider RT/IRQ pressure in capacity_spare_wake() (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Fix find_idlest_group() when local group is not allowed (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Fix usage of find_idlest_group() when no groups are allowed (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Fix usage of find_idlest_group() when the local group is idlest (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Move select_task_rq_fair() slow-path into its own function (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Remove impossible condition from find_idlest_group_cpu() (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Remove unnecessary comparison with -1 (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Spare idle load balancing on nohz_full CPUs (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/fair: Use \u0027unsigned long\u0027 for utilization, consistently (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: Evaluate move once per node (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: Modify migrate_swap() to accept additional parameters (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: Move task_numa_placement() closer to numa_migrate_preferred() (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: Remove redundant field (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: Remove redundant field -kabi (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: Remove unused task_capacity from \u0027struct numa_stats\u0027 (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: Set preferred_node based on best_cpu (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: Simplify load_too_imbalanced() (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: Skip nodes that are at \u0027hoplimit\u0027 (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: Update the scan period without holding the numa_group lock (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: Use group_weights to identify if migration degrades locality (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/numa: Use task faults only if numa_group is not yet set up (bnc#1101669 optimise numa balancing for fast migrate).\n- sched/smt: Update sched_smt_present at runtime (bsc#1089343).\n- scsi: ata: enhance the definition of SET MAX feature field value ().\n- scsi: hisi_sas: add an mechanism to do reset work synchronously ().\n- scsi: hisi_sas: add check of device in hisi_sas_task_exec() ().\n- scsi: hisi_sas: add internal abort dev in some places ().\n- scsi: hisi_sas: Add LED feature for v3 hw ().\n- scsi: hisi_sas: add RAS feature for v3 hw ().\n- scsi: hisi_sas: add readl poll timeout helper wrappers ().\n- scsi: hisi_sas: Add some checks to avoid free\u0027ing a sas_task twice ().\n- scsi: hisi_sas: add some print to enhance debugging ().\n- scsi: hisi_sas: Add v2 hw force PHY function for internal ATA command ().\n- scsi: hisi_sas: add v2 hw port AXI error handling support ().\n- scsi: hisi_sas: add v3 hw MODULE_DEVICE_TABLE() ().\n- scsi: hisi_sas: add v3 hw suspend and resume ().\n- scsi: hisi_sas: allocate slot buffer earlier ().\n- scsi: hisi_sas: Change common allocation mode of device id ().\n- scsi: hisi_sas: Change frame type for SET MAX commands ().\n- scsi: hisi_sas: change ncq process for v3 hw ().\n- scsi: hisi_sas: change slot index allocation mode ().\n- scsi: hisi_sas: check host frozen before calling \u0027done\u0027 function ().\n- scsi: hisi_sas: check IPTT is valid before using it for v3 hw ().\n- scsi: hisi_sas: check sas_dev gone earlier in hisi_sas_abort_task() ().\n- scsi: hisi_sas: Code cleanup and minor bug fixes ().\n- scsi: hisi_sas: config ATA de-reset as an constrained command for v3 hw ().\n- scsi: hisi_sas: consolidate command check in hisi_sas_get_ata_protocol() ().\n- scsi: hisi_sas: Create a scsi_host_template per HW module ().\n- scsi: hisi_sas: delete timer when removing hisi_sas driver ().\n- scsi: hisi_sas: do link reset for some CHL_INT2 ints ().\n- scsi: hisi_sas: Do not lock DQ for complete task sending ().\n- scsi: hisi_sas: dt-bindings: add an property of signal attenuation ().\n- scsi: hisi_sas: fix a bug in hisi_sas_dev_gone() ().\n- scsi: hisi_sas: fix a typo in hisi_sas_task_prep() ().\n- scsi: hisi_sas: fix dma_unmap_sg() parameter ().\n- scsi: hisi_sas: fix PI memory size ().\n- scsi: hisi_sas: fix return value of hisi_sas_task_prep() ().\n- scsi: hisi_sas: Fix return value when get_free_slot() failed ().\n- scsi: hisi_sas: fix SAS_QUEUE_FULL problem while running IO ().\n- scsi: hisi_sas: fix the issue of link rate inconsistency ().\n- scsi: hisi_sas: fix the issue of setting linkrate register ().\n- scsi: hisi_sas: improve int_chnl_int_v2_hw() consistency with v3 hw ().\n- scsi: hisi_sas: Include TMF elements in struct hisi_sas_slot ().\n- scsi: hisi_sas: increase timer expire of internal abort task ().\n- scsi: hisi_sas: Init disks after controller reset ().\n- scsi: hisi_sas: initialize dq spinlock before use ().\n- scsi: hisi_sas: Introduce hisi_sas_phy_set_linkrate() ().\n- scsi: hisi_sas: judge result of internal abort ().\n- scsi: hisi_sas: make local symbol host_attrs static ().\n- scsi: hisi_sas: make return type of prep functions void ().\n- scsi: hisi_sas: make SAS address of SATA disks unique ().\n- scsi: hisi_sas: Mark PHY as in reset for nexus reset ().\n- scsi: hisi_sas: modify hisi_sas_dev_gone() for reset ().\n- scsi: hisi_sas: modify some register config for hip08 ().\n- scsi: hisi_sas: optimise port id refresh function ().\n- scsi: hisi_sas: optimise the usage of DQ locking ().\n- scsi: hisi_sas: print device id for errors ().\n- scsi: hisi_sas: re-add the lldd_port_deformed() ().\n- scsi: hisi_sas: relocate clearing ITCT and freeing device ().\n- scsi: hisi_sas: relocate smp sg map ().\n- scsi: hisi_sas: Remove depends on HAS_DMA in case of platform dependency ().\n- scsi: hisi_sas: remove redundant handling to event95 for v3 ().\n- scsi: hisi_sas: remove some unneeded structure members ().\n- scsi: hisi_sas: remove unused variable hisi_sas_devices.running_req ().\n- scsi: hisi_sas: Reset disks when discovered ().\n- scsi: hisi_sas: some optimizations of host controller reset ().\n- scsi: hisi_sas: stop controller timer for reset ().\n- scsi: hisi_sas: support the property of signal attenuation for v2 hw ().\n- scsi: hisi_sas: Terminate STP reject quickly for v2 hw ().\n- scsi: hisi_sas: Try wait commands before before controller reset ().\n- scsi: hisi_sas: update PHY linkrate after a controller reset ().\n- scsi: hisi_sas: update RAS feature for later revision of v3 HW ().\n- scsi: hisi_sas: use an general way to delay PHY work ().\n- scsi: hisi_sas: Use device lock to protect slot alloc/free ().\n- scsi: hisi_sas: use dma_zalloc_coherent() ().\n- scsi: hisi_sas: workaround a v3 hw hilink bug ().\n- scsi: libsas: defer ata device eh commands to libata ().\n- scsi: lpfc: Add Buffer overflow check, when nvme_info larger than PAGE_SIZE (bsc#1102658).\n- scsi: lpfc: Correct LCB ACCept payload (bsc#1102658).\n- scsi: lpfc: devloss timeout race condition caused null pointer reference (bsc#1102658).\n- scsi: lpfc: Fix abort error path for NVMET (bsc#1102658).\n- scsi: lpfc: Fix driver crash when re-registering NVME rports (bsc#1102658).\n- scsi: lpfc: Fix driver not setting dpp bits correctly in doorbell word (bsc#1102658).\n- scsi: lpfc: Fix ELS abort on SLI-3 adapters (bsc#1102658).\n- scsi: lpfc: Fix list corruption on the completion queue (bsc#1102658).\n- scsi: lpfc: Fix NVME Target crash in defer rcv logic (bsc#1102658).\n- scsi: lpfc: Fix panic if driver unloaded when port is offline (bsc#1102658).\n- scsi: lpfc: Fix sysfs Speed value on CNA ports (bsc#1102658).\n- scsi: lpfc: Limit tracking of tgt queue depth in fast path (bsc#1102658).\n- scsi: lpfc: Make PBDE optimizations configurable (bsc#1102658).\n- scsi: lpfc: Remove lpfc_enable_pbde as module parameter (bsc#1102658).\n- scsi: lpfc: Revise copyright for new company language (bsc#1102658).\n- scsi: lpfc: Support duration field in Link Cable Beacon V1 command (bsc#1102658).\n- scsi: lpfc: update driver version to 12.0.0.5 (bsc#1102658).\n- scsi: lpfc: update driver version to 12.0.0.6 (bsc#1102658).\n- scsi: mpt3sas: Add an I/O barrier (bsc#1086906,).\n- scsi: mpt3sas: Added support for SAS Device Discovery Error Event (bsc#1086906,).\n- scsi: mpt3sas: Add PCI device ID for Andromeda (bsc#1086906,).\n- scsi: mpt3sas: Allow processing of events during driver unload (bsc#1086906,).\n- scsi: mpt3sas: As per MPI-spec, use combined reply queue for SAS3.5 controllers when HBA supports more than 16 MSI-x vectors (bsc#1086906,).\n- scsi: mpt3sas: Bug fix for big endian systems (bsc#1086906,).\n- scsi: mpt3sas: Cache enclosure pages during enclosure add (bsc#1086906,).\n- scsi: mpt3sas: clarify mmio pointer types (bsc#1086906,).\n- scsi: mpt3sas: Configure reply post queue depth, DMA and sgl tablesize (bsc#1086906,).\n- scsi: mpt3sas: Do not abort I/Os issued to NVMe drives while processing Async Broadcast primitive event (bsc#1086906,).\n- scsi: mpt3sas: Do not access the structure after decrementing it\u0027s instance reference count (bsc#1086906,).\n- scsi: mpt3sas: Do not mark fw_event workqueue as WQ_MEM_RECLAIM (bsc#1086906,).\n- scsi: mpt3sas: Enhanced handling of Sense Buffer (bsc#1086906,).\n- scsi: mpt3sas: Fix, False timeout prints for ioctl and other internal commands during controller reset (bsc#1086906,).\n- scsi: mpt3sas: fix possible memory leak (bsc#1086906,).\n- scsi: mpt3sas: fix spelling mistake: \u0027disbale\u0027 -\u003e \u0027disable\u0027 (bsc#1086906,).\n- scsi: mpt3sas: For NVME device, issue a protocol level reset (bsc#1086906,).\n- scsi: mpt3sas: Incorrect command status was set/marked as not used (bsc#1086906,).\n- scsi: mpt3sas: Increase event log buffer to support 24 port HBA\u0027s (bsc#1086906,).\n- scsi: mpt3sas: Introduce API to get BAR0 mapped buffer address (bsc#1086906,).\n- scsi: mpt3sas: Introduce Base function for cloning (bsc#1086906,).\n- scsi: mpt3sas: Introduce function to clone mpi reply (bsc#1086906,).\n- scsi: mpt3sas: Introduce function to clone mpi request (bsc#1086906,).\n- scsi: mpt3sas: Lockless access for chain buffers (bsc#1086906,).\n- scsi: mpt3sas: Optimize I/O memory consumption in driver (bsc#1086906,).\n- scsi: mpt3sas: Pre-allocate RDPQ Array at driver boot time (bsc#1086906,).\n- scsi: mpt3sas: Replace PCI pool old API (bsc#1081917). \n- scsi: mpt3sas: Report Firmware Package Version from HBA Driver (bsc#1086906,).\n- scsi: mpt3sas: Update driver version \u002725.100.00.00\u0027 (bsc#1086906,).\n- scsi: mpt3sas: Update driver version \u002726.100.00.00\u0027 (bsc#1086906,).\n- scsi: mpt3sas: Update MPI Headers (bsc#1086906,).\n- scsi: qedf: Add additional checks when restarting an rport due to ABTS timeout (bsc#1086317).\n- scsi: qedf: Add check for offload before flushing I/Os for target (bsc#1086317).\n- scsi: qedf: Add dcbx_not_wait module parameter so we won\u0027t wait for DCBX convergence to start discovery (bsc#1086317).\n- scsi: qedf: Add missing skb frees in error path (bsc#1086317).\n- scsi: qedf: Add more defensive checks for concurrent error conditions (bsc#1086317).\n- scsi: qedf: Add task id to kref_get_unless_zero() debug messages when flushing requests (bsc#1086317).\n- scsi: qedf: Check if link is already up when receiving a link up event from qed (bsc#1086317).\n- scsi: qedf: fix LTO-enabled build (bsc#1086317).\n- scsi: qedf: Fix VLAN display when printing sent FIP frames (bsc#1086317).\n- scsi: qedf: Honor default_prio module parameter even if DCBX does not converge (bsc#1086317).\n- scsi: qedf: Honor priority from DCBX FCoE App tag (bsc#1086317).\n- scsi: qedf: If qed fails to enable MSI-X fail PCI probe (bsc#1086317).\n- scsi: qedf: Improve firmware debug dump handling (bsc#1086317).\n- scsi: qedf: Increase the number of default FIP VLAN request retries to 60 (bsc#1086317).\n- scsi: qedf: Release RRQ reference correctly when RRQ command times out (bsc#1086317).\n- scsi: qedf: remove redundant initialization of \u0027fcport\u0027 (bsc#1086317).\n- scsi: qedf: Remove setting DCBX pending during soft context reset (bsc#1086317).\n- scsi: qedf: Return request as DID_NO_CONNECT if MSI-X is not enabled (bsc#1086317).\n- scsi: qedf: Sanity check FCoE/FIP priority value to make sure it\u0027s between 0 and 7 (bsc#1086317).\n- scsi: qedf: Send the driver state to MFW (bsc#1086317).\n- scsi: qedf: Set the UNLOADING flag when removing a vport (bsc#1086317).\n- scsi: qedf: Synchronize rport restarts when multiple ELS commands time out (bsc#1086317).\n- scsi: qedf: Update copyright for 2018 (bsc#1086317).\n- scsi: qedf: Update version number to 8.33.16.20 (bsc#1086317).\n- scsi: qedf: use correct strncpy() size (bsc#1086317).\n- scsi: qedi: fix building with LTO (bsc#1086315).\n- scsi: qedi: fix build regression (bsc#1086315).\n- scsi: qedi: Fix kernel crash during port toggle (bsc#1086315).\n- scsi: qedi: Send driver state to MFW (bsc#1086315).\n- scsi: qla2xxx: Avoid double completion of abort command (git-fixes).\n- scsi: qla2xxx: correctly shift host byte (bsc#1086327,).\n- scsi: qla2xxx: Correct setting of SAM_STAT_CHECK_CONDITION (bsc#1086327,).\n- scsi: qla2xxx: Fix crash on qla2x00_mailbox_command (bsc#1086327,).\n- scsi: qla2xxx: Fix driver unload by shutting down chip (git-fixes).\n- scsi: qla2xxx: Fix Inquiry command being dropped in Target mode (bsc#1086327,).\n- scsi: qla2xxx: Fix NPIV deletion by calling wait_for_sess_deletion (git-fixes).\n- scsi: qla2xxx: Fix NULL pointer dereference for fcport search (git-fixes).\n- scsi: qla2xxx: Fix race condition between iocb timeout and initialisation (bsc#1086327,).\n- scsi: qla2xxx: Fix Rport and session state getting out of sync (bsc#1086327,).\n- scsi: qla2xxx: Fix sending ADISC command for login (bsc#1086327,).\n- scsi: qla2xxx: Fix setting lower transfer speed if GPSC fails (bsc#1086327,).\n- scsi: qla2xxx: Fix TMF and Multi-Queue config (bsc#1086327,).\n- scsi: qla2xxx: Fix unintialized List head crash (git-fixes).\n- scsi: qla2xxx: Move GPSC and GFPNID out of session management (bsc#1086327,).\n- scsi: qla2xxx: Prevent relogin loop by removing stale code (bsc#1086327,).\n- scsi: qla2xxx: Reduce redundant ADISC command for RSCNs (bsc#1086327,).\n- scsi: qla2xxx: remove irq save in qla2x00_poll() (bsc#1086327,).\n- scsi: qla2xxx: Remove stale debug value for login_retry flag (bsc#1086327,).\n- scsi: qla2xxx: Return error when TMF returns (git-fixes).\n- scsi: qla2xxx: Update driver version to 10.00.00.07-k (bsc#1086327,).\n- scsi: qla2xxx: Use predefined get_datalen_for_atio() inline function (bsc#1086327,).\n- scsi: qla4xxx: Move an array from a .h into a .c file (bsc#1086331).\n- scsi: qla4xxx: Remove unused symbols (bsc#1086331).\n- scsi: qla4xxx: skip error recovery in case of register disconnect (bsc#1086331).\n- scsi: qla4xxx: Use dma_pool_zalloc() (bsc#1086331).\n- scsi: qla4xxx: Use zeroing allocator rather than allocator/memset (bsc#1086331).\n- scsi: smartpqi: add in new supported controllers (bsc#1086274).\n- scsi: smartpqi: add inspur advantech ids (bsc#1086274).\n- scsi: smartpqi: bump driver version to 1.1.4-130 (bsc#1086274).\n- scsi: smartpqi: fix critical ARM issue reading PQI index registers (bsc#1086274).\n- scsi: smartpqi: improve error checking for sync requests (bsc#1086274).\n- scsi: smartpqi: improve handling for sync requests (bsc#1086274).\n- scsi: smartpqi: update driver version (bsc#1086274).\n- scsi: smartpqi: workaround fw bug for oq deletion (bsc#1086274).\n- sctp: fix the issue that pathmtu may be set lower than MINSEGMENT (git-fixes).\n- sctp: introduce sctp_dst_mtu (git-fixes).\n- selftests/powerpc: Fix core-pkey for default execute permission change (bsc#1097577).\n- selftests/powerpc: Fix ptrace-pkey for default execute permission change (bsc#1097577).\n- series.conf: Sort automatic NUMA balancing related patch\n- soc: bcm2835: Make !RASPBERRYPI_FIRMWARE dummies return failure (bsc#1051510).\n- soc: bcm: raspberrypi-power: Fix use of __packed (bsc#1051510).\n- soc: imx: gpc: de-register power domains only if initialized (bsc#1051510).\n- soc: imx: gpc: restrict register range for regmap access (bsc#1051510).\n- soc: imx: gpcv2: correct PGC offset (bsc#1051510).\n- soc: imx: gpcv2: Do not pass static memory as platform data (bsc#1051510).\n- soc: imx: gpcv2: fix regulator deferred probe (bsc#1051510).\n- soc: mediatek: pwrap: fix compiler errors (bsc#1051510).\n- soc: qcom: wcnss_ctrl: Fix increment in NV upload (bsc#1051510).\n- soc: rockchip: power-domain: Fix wrong value when power up pd with writemask (bsc#1051510).\n- soc/tegra: Fix bad of_node_put() in powergate init (bsc#1051510).\n- soc/tegra: flowctrl: Fix error handling (bsc#1051510).\n- soc: ti: ti_sci_pm_domains: Populate name for genpd (bsc#1051510).\n- soc: zte: Restrict SOC_ZTE to ARCH_ZX or COMPILE_TEST (bsc#1051510).\n- spi: bcm2835aux: ensure interrupts are enabled for shared handler (bsc#1051510).\n- spi/bcm63xx-hspi: Enable the clock before calling clk_get_rate() (bsc#1051510).\n- spi: bcm-qspi: Always read and set BSPI_MAST_N_BOOT_CTRL (bsc#1051510).\n- spi: bcm-qspi: Avoid setting MSPI_CDRAM_PCS for spi-nor master (bsc#1051510).\n- spi: cadence: Add usleep_range() for cdns_spi_fill_tx_fifo() (bsc#1051510).\n- spi: pxa2xx: Allow 64-bit DMA (bsc#1051510).\n- spi: pxa2xx: check clk_prepare_enable() return value (bsc#1051510).\n- spi: spi-fsl-dspi: Fix imprecise abort on VF500 during probe (bsc#1051510).\n- sr: pass down correctly sized SCSI sense buffer (git-fixes).\n- staging: ks7010: Use constants from ieee80211_eid instead of literal ints (bsc#1051510).\n- staging: speakup: fix wraparound in uaccess length check (bsc#1051510).\n- supported.conf: add drivers/md/dm-writecache\n- supported.conf: added hns3 modules\n- supported.conf: added hns-roce-hw-v1 and hns-roce-hw-v2\n- supported.conf: Enable HiSi v3 SAS adapter ()\n- sysrq : fix Show Regs call trace on ARM (bsc#1051510).\n- TCM_RBD depends on BLK_DEV_RBD ().\n- thermal: exynos: fix setting rising_threshold for Exynos5433 (bsc#1051510).\n- tty: Fix data race in tty_insert_flip_string_fixed_flag (bsc#1051510).\n- typec: tcpm: Fix a msecs vs jiffies bug (bsc#1100132).\n- typec: tcpm: fusb302: Resolve out of order messaging events (bsc#1087092).\n- udf: Detect incorrect directory size (bsc#1101891).\n- udf: Provide saner default for invalid uid / gid (bsc#1101890).\n- Update patches.arch/KVM-PPC-Check-if-IOMMU-page-is-contained-in-the-pinn.patch (bsc#1077761, git-fixes, bsc#1103948, bsc#1103949).\n- usb: hub: Do not wait for connect state at resume for powered-off ports (bsc#1051510).\n- usbip: usbip_detach: Fix memory, udev context and udev leak (bsc#1051510).\n- vfs: add the sb_start_intwrite_trylock() helper (bsc#1101841).\n- virtio_balloon: fix another race between migration and ballooning (bsc#1051510).\n- wlcore: sdio: check for valid platform device data before suspend (bsc#1051510).\n- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).\n- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).\n- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).\n- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).\n- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- x86/KVM/VMX: Add module argument for L1TF mitigation.\n- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).\n- x86/topology: Provide topology_smt_supported() (bsc#1089343).\n- x86: Treat R_X86_64_PLT32 as R_X86_64_PC32 (binutils_2.31).\n- x86/xen: init %gs very early to avoid page faults with stack protector (bnc#1104777).\n- xen-netback: fix input validation in xenvif_set_hash_mapping() (bnc#1103277).\n- xen/netfront: do not cache skb_shinfo() (bnc#1065600).\n- xfs: catch inode allocation state mismatch corruption (bsc#1104211).\n- xfs: prevent creating negative-sized file via INSERT_RANGE (bsc#1101833).\n- xhci: Fix perceived dead host due to runtime suspend race with event handler (bsc#1051510).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Public-Cloud-15-2018-1701", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2450-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2450-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182450-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2450-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1051979", "url": "https://bugzilla.suse.com/1051979" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1066110", "url": "https://bugzilla.suse.com/1066110" }, { "category": "self", "summary": "SUSE Bug 1077761", "url": "https://bugzilla.suse.com/1077761" }, { "category": "self", "summary": "SUSE Bug 1081917", "url": "https://bugzilla.suse.com/1081917" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1086274", "url": "https://bugzilla.suse.com/1086274" }, { "category": "self", "summary": "SUSE Bug 1086288", "url": "https://bugzilla.suse.com/1086288" }, { "category": "self", "summary": "SUSE Bug 1086314", "url": "https://bugzilla.suse.com/1086314" }, { "category": "self", "summary": "SUSE Bug 1086315", "url": "https://bugzilla.suse.com/1086315" }, { "category": "self", "summary": "SUSE Bug 1086317", "url": "https://bugzilla.suse.com/1086317" }, { "category": "self", "summary": "SUSE Bug 1086327", "url": "https://bugzilla.suse.com/1086327" }, { "category": "self", "summary": "SUSE Bug 1086331", "url": "https://bugzilla.suse.com/1086331" }, { "category": "self", "summary": "SUSE Bug 1086906", "url": "https://bugzilla.suse.com/1086906" }, { "category": "self", "summary": "SUSE Bug 1087081", "url": "https://bugzilla.suse.com/1087081" }, { "category": "self", "summary": "SUSE Bug 1087092", "url": "https://bugzilla.suse.com/1087092" }, { "category": "self", "summary": "SUSE Bug 1089343", "url": "https://bugzilla.suse.com/1089343" }, { "category": "self", "summary": "SUSE Bug 1090888", "url": "https://bugzilla.suse.com/1090888" }, { "category": "self", "summary": "SUSE Bug 1097104", "url": "https://bugzilla.suse.com/1097104" }, { "category": "self", "summary": "SUSE Bug 1097577", "url": "https://bugzilla.suse.com/1097577" }, { "category": "self", "summary": "SUSE Bug 1097808", "url": "https://bugzilla.suse.com/1097808" }, { "category": "self", "summary": "SUSE Bug 1099811", "url": "https://bugzilla.suse.com/1099811" }, { "category": "self", "summary": "SUSE Bug 1099813", "url": "https://bugzilla.suse.com/1099813" }, { "category": "self", "summary": "SUSE Bug 1099844", "url": "https://bugzilla.suse.com/1099844" }, { "category": "self", "summary": "SUSE Bug 1099845", "url": "https://bugzilla.suse.com/1099845" }, { "category": "self", "summary": "SUSE Bug 1099846", "url": "https://bugzilla.suse.com/1099846" }, { "category": "self", "summary": "SUSE Bug 1099849", "url": "https://bugzilla.suse.com/1099849" }, { "category": "self", "summary": "SUSE Bug 1099858", "url": "https://bugzilla.suse.com/1099858" }, { "category": "self", "summary": "SUSE Bug 1099863", "url": "https://bugzilla.suse.com/1099863" }, { "category": "self", "summary": "SUSE Bug 1099864", "url": "https://bugzilla.suse.com/1099864" }, { "category": "self", "summary": "SUSE Bug 1100132", "url": "https://bugzilla.suse.com/1100132" }, { "category": "self", "summary": "SUSE Bug 1101116", "url": "https://bugzilla.suse.com/1101116" }, { "category": "self", "summary": "SUSE Bug 1101331", "url": "https://bugzilla.suse.com/1101331" }, { "category": "self", "summary": "SUSE Bug 1101669", "url": "https://bugzilla.suse.com/1101669" }, { "category": "self", "summary": "SUSE Bug 1101822", "url": "https://bugzilla.suse.com/1101822" }, { "category": "self", "summary": "SUSE Bug 1101828", "url": "https://bugzilla.suse.com/1101828" }, { "category": "self", "summary": "SUSE Bug 1101832", "url": "https://bugzilla.suse.com/1101832" }, { "category": "self", "summary": "SUSE Bug 1101833", "url": "https://bugzilla.suse.com/1101833" }, { "category": "self", "summary": "SUSE Bug 1101837", "url": "https://bugzilla.suse.com/1101837" }, { "category": "self", "summary": "SUSE Bug 1101839", "url": "https://bugzilla.suse.com/1101839" }, { "category": "self", "summary": "SUSE Bug 1101841", "url": "https://bugzilla.suse.com/1101841" }, { "category": "self", "summary": "SUSE Bug 1101843", "url": "https://bugzilla.suse.com/1101843" }, { "category": "self", "summary": "SUSE Bug 1101844", "url": "https://bugzilla.suse.com/1101844" }, { "category": "self", "summary": "SUSE Bug 1101845", "url": "https://bugzilla.suse.com/1101845" }, { "category": "self", "summary": "SUSE Bug 1101847", "url": "https://bugzilla.suse.com/1101847" }, { "category": "self", "summary": "SUSE Bug 1101852", "url": "https://bugzilla.suse.com/1101852" }, { "category": "self", "summary": "SUSE Bug 1101853", "url": "https://bugzilla.suse.com/1101853" }, { "category": "self", "summary": "SUSE Bug 1101867", "url": "https://bugzilla.suse.com/1101867" }, { "category": "self", "summary": "SUSE Bug 1101872", "url": "https://bugzilla.suse.com/1101872" }, { "category": "self", "summary": "SUSE Bug 1101874", "url": "https://bugzilla.suse.com/1101874" }, { "category": "self", "summary": "SUSE Bug 1101875", "url": "https://bugzilla.suse.com/1101875" }, { "category": "self", "summary": "SUSE Bug 1101882", "url": "https://bugzilla.suse.com/1101882" }, { "category": "self", "summary": "SUSE Bug 1101883", "url": "https://bugzilla.suse.com/1101883" }, { "category": "self", "summary": "SUSE Bug 1101885", "url": "https://bugzilla.suse.com/1101885" }, { "category": "self", "summary": "SUSE Bug 1101887", "url": "https://bugzilla.suse.com/1101887" }, { "category": "self", "summary": "SUSE Bug 1101890", "url": "https://bugzilla.suse.com/1101890" }, { "category": "self", "summary": "SUSE Bug 1101891", "url": "https://bugzilla.suse.com/1101891" }, { "category": "self", "summary": "SUSE Bug 1101893", "url": "https://bugzilla.suse.com/1101893" }, { "category": "self", "summary": "SUSE Bug 1101895", "url": "https://bugzilla.suse.com/1101895" }, { "category": "self", "summary": "SUSE Bug 1101896", "url": "https://bugzilla.suse.com/1101896" }, { "category": "self", "summary": "SUSE Bug 1101900", "url": "https://bugzilla.suse.com/1101900" }, { "category": "self", "summary": "SUSE Bug 1101902", "url": "https://bugzilla.suse.com/1101902" }, { "category": "self", "summary": "SUSE Bug 1101903", "url": "https://bugzilla.suse.com/1101903" }, { "category": "self", "summary": "SUSE Bug 1102633", "url": "https://bugzilla.suse.com/1102633" }, { "category": "self", "summary": "SUSE Bug 1102658", "url": "https://bugzilla.suse.com/1102658" }, { "category": "self", "summary": "SUSE Bug 1103097", "url": "https://bugzilla.suse.com/1103097" }, { "category": "self", "summary": "SUSE Bug 1103269", "url": "https://bugzilla.suse.com/1103269" }, { "category": "self", "summary": "SUSE Bug 1103277", "url": "https://bugzilla.suse.com/1103277" }, { "category": "self", "summary": "SUSE Bug 1103356", "url": "https://bugzilla.suse.com/1103356" }, { "category": "self", "summary": "SUSE Bug 1103363", "url": "https://bugzilla.suse.com/1103363" }, { "category": "self", "summary": "SUSE Bug 1103421", "url": "https://bugzilla.suse.com/1103421" }, { "category": "self", "summary": "SUSE Bug 1103445", "url": "https://bugzilla.suse.com/1103445" }, { "category": "self", "summary": "SUSE Bug 1103517", "url": "https://bugzilla.suse.com/1103517" }, { "category": "self", "summary": "SUSE Bug 1103723", "url": "https://bugzilla.suse.com/1103723" }, { "category": "self", "summary": "SUSE Bug 1103724", "url": "https://bugzilla.suse.com/1103724" }, { "category": "self", "summary": "SUSE Bug 1103725", "url": "https://bugzilla.suse.com/1103725" }, { "category": "self", "summary": "SUSE Bug 1103726", "url": "https://bugzilla.suse.com/1103726" }, { "category": "self", "summary": "SUSE Bug 1103727", "url": "https://bugzilla.suse.com/1103727" }, { "category": "self", "summary": "SUSE Bug 1103728", "url": "https://bugzilla.suse.com/1103728" }, { "category": "self", "summary": "SUSE Bug 1103729", "url": "https://bugzilla.suse.com/1103729" }, { "category": "self", "summary": "SUSE Bug 1103730", "url": "https://bugzilla.suse.com/1103730" }, { "category": "self", "summary": "SUSE Bug 1103886", "url": "https://bugzilla.suse.com/1103886" }, { "category": "self", "summary": "SUSE Bug 1103917", "url": "https://bugzilla.suse.com/1103917" }, { "category": "self", "summary": "SUSE Bug 1103920", "url": "https://bugzilla.suse.com/1103920" }, { "category": "self", "summary": "SUSE Bug 1103948", "url": "https://bugzilla.suse.com/1103948" }, { "category": "self", "summary": "SUSE Bug 1103949", "url": "https://bugzilla.suse.com/1103949" }, { "category": "self", "summary": "SUSE Bug 1104066", "url": "https://bugzilla.suse.com/1104066" }, { "category": "self", "summary": "SUSE Bug 1104111", "url": "https://bugzilla.suse.com/1104111" }, { "category": "self", "summary": "SUSE Bug 1104174", "url": "https://bugzilla.suse.com/1104174" }, { "category": "self", "summary": "SUSE Bug 1104211", "url": "https://bugzilla.suse.com/1104211" }, { "category": "self", "summary": "SUSE Bug 1104319", "url": "https://bugzilla.suse.com/1104319" }, { "category": "self", "summary": "SUSE Bug 1104353", "url": "https://bugzilla.suse.com/1104353" }, { "category": "self", "summary": "SUSE Bug 1104365", "url": "https://bugzilla.suse.com/1104365" }, { "category": "self", "summary": "SUSE Bug 1104427", "url": "https://bugzilla.suse.com/1104427" }, { "category": "self", "summary": "SUSE Bug 1104494", "url": "https://bugzilla.suse.com/1104494" }, { "category": "self", "summary": "SUSE Bug 1104495", "url": "https://bugzilla.suse.com/1104495" }, { "category": "self", "summary": "SUSE Bug 1104708", "url": "https://bugzilla.suse.com/1104708" }, { "category": "self", "summary": "SUSE Bug 1104777", "url": "https://bugzilla.suse.com/1104777" }, { "category": "self", "summary": "SUSE Bug 1104897", "url": "https://bugzilla.suse.com/1104897" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10876 page", "url": "https://www.suse.com/security/cve/CVE-2018-10876/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10877 page", "url": "https://www.suse.com/security/cve/CVE-2018-10877/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10878 page", "url": "https://www.suse.com/security/cve/CVE-2018-10878/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10879 page", "url": "https://www.suse.com/security/cve/CVE-2018-10879/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10880 page", "url": "https://www.suse.com/security/cve/CVE-2018-10880/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10881 page", "url": "https://www.suse.com/security/cve/CVE-2018-10881/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10882 page", "url": "https://www.suse.com/security/cve/CVE-2018-10882/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10883 page", "url": "https://www.suse.com/security/cve/CVE-2018-10883/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3620 page", "url": "https://www.suse.com/security/cve/CVE-2018-3620/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5391 page", "url": "https://www.suse.com/security/cve/CVE-2018-5391/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-08-20T08:36:21Z", "generator": { "date": "2018-08-20T08:36:21Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2450-1", "initial_release_date": "2018-08-20T08:36:21Z", "revision_history": [ { "date": "2018-08-20T08:36:21Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-4.12.14-5.13.1.noarch", "product": { "name": "kernel-devel-azure-4.12.14-5.13.1.noarch", "product_id": "kernel-devel-azure-4.12.14-5.13.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.12.14-5.13.1.noarch", "product": { "name": "kernel-source-azure-4.12.14-5.13.1.noarch", "product_id": "kernel-source-azure-4.12.14-5.13.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-azure-4.12.14-5.13.1.x86_64", "product": { "name": "kernel-azure-4.12.14-5.13.1.x86_64", "product_id": "kernel-azure-4.12.14-5.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.12.14-5.13.1.x86_64", "product": { "name": "kernel-azure-base-4.12.14-5.13.1.x86_64", "product_id": "kernel-azure-base-4.12.14-5.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.12.14-5.13.1.x86_64", "product": { "name": "kernel-azure-devel-4.12.14-5.13.1.x86_64", "product_id": "kernel-azure-devel-4.12.14-5.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-4.12.14-5.13.1.x86_64", "product": { "name": "kernel-syms-azure-4.12.14-5.13.1.x86_64", "product_id": "kernel-syms-azure-4.12.14-5.13.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 15", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-5.13.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-5.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-5.13.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-5.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-5.13.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-5.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-5.13.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-5.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-5.13.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-5.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-5.13.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-5.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-20T08:36:21Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-10876", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10876" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10876", "url": "https://www.suse.com/security/cve/CVE-2018-10876" }, { "category": "external", "summary": "SUSE Bug 1099811 for CVE-2018-10876", "url": "https://bugzilla.suse.com/1099811" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-20T08:36:21Z", "details": "moderate" } ], "title": "CVE-2018-10876" }, { "cve": "CVE-2018-10877", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10877" } ], "notes": [ { "category": "general", "text": "Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10877", "url": "https://www.suse.com/security/cve/CVE-2018-10877" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10877", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099846 for CVE-2018-10877", "url": "https://bugzilla.suse.com/1099846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-20T08:36:21Z", "details": "moderate" } ], "title": "CVE-2018-10877" }, { "cve": "CVE-2018-10878", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10878" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10878", "url": "https://www.suse.com/security/cve/CVE-2018-10878" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10878", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099813 for CVE-2018-10878", "url": "https://bugzilla.suse.com/1099813" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-20T08:36:21Z", "details": "moderate" } ], "title": "CVE-2018-10878" }, { "cve": "CVE-2018-10879", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10879" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10879", "url": "https://www.suse.com/security/cve/CVE-2018-10879" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10879", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099844 for CVE-2018-10879", "url": "https://bugzilla.suse.com/1099844" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-20T08:36:21Z", "details": "moderate" } ], "title": "CVE-2018-10879" }, { "cve": "CVE-2018-10880", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10880" } ], "notes": [ { "category": "general", "text": "Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10880", "url": "https://www.suse.com/security/cve/CVE-2018-10880" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10880", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099845 for CVE-2018-10880", "url": "https://bugzilla.suse.com/1099845" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-20T08:36:21Z", "details": "moderate" } ], "title": "CVE-2018-10880" }, { "cve": "CVE-2018-10881", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10881" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10881", "url": "https://www.suse.com/security/cve/CVE-2018-10881" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10881", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099864 for CVE-2018-10881", "url": "https://bugzilla.suse.com/1099864" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-20T08:36:21Z", "details": "moderate" } ], "title": "CVE-2018-10881" }, { "cve": "CVE-2018-10882", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10882" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10882", "url": "https://www.suse.com/security/cve/CVE-2018-10882" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10882", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099849 for CVE-2018-10882", "url": "https://bugzilla.suse.com/1099849" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-20T08:36:21Z", "details": "moderate" } ], "title": "CVE-2018-10882" }, { "cve": "CVE-2018-10883", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10883" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10883", "url": "https://www.suse.com/security/cve/CVE-2018-10883" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10883", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1099863 for CVE-2018-10883", "url": "https://bugzilla.suse.com/1099863" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-20T08:36:21Z", "details": "moderate" } ], "title": "CVE-2018-10883" }, { "cve": "CVE-2018-3620", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3620" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3620", "url": "https://www.suse.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1090340 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1090340" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-20T08:36:21Z", "details": "moderate" } ], "title": "CVE-2018-3620" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-20T08:36:21Z", "details": "important" } ], "title": "CVE-2018-3646" }, { "cve": "CVE-2018-5391", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5391" } ], "notes": [ { "category": "general", "text": "The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5391", "url": "https://www.suse.com/security/cve/CVE-2018-5391" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1108654 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1108654" }, { "category": "external", "summary": "SUSE Bug 1114071 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1114071" }, { "category": "external", "summary": "SUSE Bug 1121102 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1121102" }, { "category": "external", "summary": "SUSE Bug 1134140 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1134140" }, { "category": "external", "summary": "SUSE Bug 1181460 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1181460" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-20T08:36:21Z", "details": "moderate" } ], "title": "CVE-2018-5391" } ] }
suse-su-2018:2368-1
Vulnerability from csaf_suse
Published
2018-08-16 06:06
Modified
2018-08-16 06:06
Summary
Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP1)
Description of the patch
This update for the Linux Kernel 3.12.74-60_64_85 fixes several issues.
The following security issues were fixed:
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
Patchnames
SUSE-SLE-SAP-12-SP1-2018-1595,SUSE-SLE-SERVER-12-SP1-2018-1595
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_85 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).\n- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn\u0027t propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-1595,SUSE-SLE-SERVER-12-SP1-2018-1595", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2368-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2368-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182368-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2368-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004447.html" }, { "category": "self", "summary": "SUSE Bug 1097108", "url": "https://bugzilla.suse.com/1097108" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-08-16T06:06:33Z", "generator": { "date": "2018-08-16T06:06:33Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2368-1", "initial_release_date": "2018-08-16T06:06:33Z", "revision_history": [ { "date": "2018-08-16T06:06:33Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_85-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_85-default-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_85-default-6-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_85-xen-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_85-xen-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_85-xen-6-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:06:33Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:06:33Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2410-1
Vulnerability from csaf_suse
Published
2018-08-17 11:42
Modified
2018-08-17 11:42
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following security issues:
- CVE-2018-3646: Systems with microprocessors utilizing speculative execution
and address translations may have allowed unauthorized disclosure of
information residing in the L1 data cache to an attacker with local user access
with guest OS privilege via a terminal page fault and a side-channel analysis
(bsc#1091107, bsc#1027519).
- Incorrect MSR_DEBUGCTL handling let guests enable BTS allowing a malicious or
buggy guest administrator can lock up the entire host (bsc#1103276)
Patchnames
SUSE-OpenStack-Cloud-7-2018-1664,SUSE-SLE-SAP-12-SP2-2018-1664,SUSE-SLE-SERVER-12-SP2-2018-1664,SUSE-Storage-4-2018-1664
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following security issues:\n\n- CVE-2018-3646: Systems with microprocessors utilizing speculative execution\n and address translations may have allowed unauthorized disclosure of\n information residing in the L1 data cache to an attacker with local user access\n with guest OS privilege via a terminal page fault and a side-channel analysis\n (bsc#1091107, bsc#1027519).\n- Incorrect MSR_DEBUGCTL handling let guests enable BTS allowing a malicious or\n buggy guest administrator can lock up the entire host (bsc#1103276)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-OpenStack-Cloud-7-2018-1664,SUSE-SLE-SAP-12-SP2-2018-1664,SUSE-SLE-SERVER-12-SP2-2018-1664,SUSE-Storage-4-2018-1664", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2410-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2410-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182410-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2410-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004465.html" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1091107", "url": "https://bugzilla.suse.com/1091107" }, { "category": "self", "summary": "SUSE Bug 1103276", "url": "https://bugzilla.suse.com/1103276" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2018-08-17T11:42:41Z", "generator": { "date": "2018-08-17T11:42:41Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2410-1", "initial_release_date": "2018-08-17T11:42:41Z", "revision_history": [ { "date": "2018-08-17T11:42:41Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.7.6_04-43.39.1.x86_64", "product": { "name": "xen-4.7.6_04-43.39.1.x86_64", "product_id": "xen-4.7.6_04-43.39.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.7.6_04-43.39.1.x86_64", "product": { "name": "xen-doc-html-4.7.6_04-43.39.1.x86_64", "product_id": "xen-doc-html-4.7.6_04-43.39.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.7.6_04-43.39.1.x86_64", "product": { "name": "xen-libs-4.7.6_04-43.39.1.x86_64", "product_id": "xen-libs-4.7.6_04-43.39.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.7.6_04-43.39.1.x86_64", "product": { "name": "xen-libs-32bit-4.7.6_04-43.39.1.x86_64", "product_id": "xen-libs-32bit-4.7.6_04-43.39.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.7.6_04-43.39.1.x86_64", "product": { "name": "xen-tools-4.7.6_04-43.39.1.x86_64", "product_id": "xen-tools-4.7.6_04-43.39.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.7.6_04-43.39.1.x86_64", "product": { "name": "xen-tools-domU-4.7.6_04-43.39.1.x86_64", "product_id": "xen-tools-domU-4.7.6_04-43.39.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 7", "product": { "name": "SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:7" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 4", "product": { "name": "SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.7.6_04-43.39.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:xen-4.7.6_04-43.39.1.x86_64" }, "product_reference": "xen-4.7.6_04-43.39.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.7.6_04-43.39.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_04-43.39.1.x86_64" }, "product_reference": "xen-doc-html-4.7.6_04-43.39.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.7.6_04-43.39.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:xen-libs-4.7.6_04-43.39.1.x86_64" }, "product_reference": "xen-libs-4.7.6_04-43.39.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.7.6_04-43.39.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_04-43.39.1.x86_64" }, "product_reference": "xen-libs-32bit-4.7.6_04-43.39.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.7.6_04-43.39.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:xen-tools-4.7.6_04-43.39.1.x86_64" }, "product_reference": "xen-tools-4.7.6_04-43.39.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.7.6_04-43.39.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_04-43.39.1.x86_64" }, "product_reference": "xen-tools-domU-4.7.6_04-43.39.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.7.6_04-43.39.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_04-43.39.1.x86_64" }, "product_reference": "xen-4.7.6_04-43.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.7.6_04-43.39.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_04-43.39.1.x86_64" }, "product_reference": "xen-doc-html-4.7.6_04-43.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.7.6_04-43.39.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_04-43.39.1.x86_64" }, "product_reference": "xen-libs-4.7.6_04-43.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.7.6_04-43.39.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_04-43.39.1.x86_64" }, "product_reference": "xen-libs-32bit-4.7.6_04-43.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.7.6_04-43.39.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_04-43.39.1.x86_64" }, "product_reference": "xen-tools-4.7.6_04-43.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.7.6_04-43.39.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_04-43.39.1.x86_64" }, "product_reference": "xen-tools-domU-4.7.6_04-43.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.7.6_04-43.39.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_04-43.39.1.x86_64" }, "product_reference": "xen-4.7.6_04-43.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.7.6_04-43.39.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_04-43.39.1.x86_64" }, "product_reference": "xen-doc-html-4.7.6_04-43.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.7.6_04-43.39.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_04-43.39.1.x86_64" }, "product_reference": "xen-libs-4.7.6_04-43.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.7.6_04-43.39.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_04-43.39.1.x86_64" }, "product_reference": "xen-libs-32bit-4.7.6_04-43.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.7.6_04-43.39.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_04-43.39.1.x86_64" }, "product_reference": "xen-tools-4.7.6_04-43.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.7.6_04-43.39.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_04-43.39.1.x86_64" }, "product_reference": "xen-tools-domU-4.7.6_04-43.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.7.6_04-43.39.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:xen-4.7.6_04-43.39.1.x86_64" }, "product_reference": "xen-4.7.6_04-43.39.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.7.6_04-43.39.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:xen-doc-html-4.7.6_04-43.39.1.x86_64" }, "product_reference": "xen-doc-html-4.7.6_04-43.39.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.7.6_04-43.39.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:xen-libs-4.7.6_04-43.39.1.x86_64" }, "product_reference": "xen-libs-4.7.6_04-43.39.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.7.6_04-43.39.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:xen-libs-32bit-4.7.6_04-43.39.1.x86_64" }, "product_reference": "xen-libs-32bit-4.7.6_04-43.39.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.7.6_04-43.39.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:xen-tools-4.7.6_04-43.39.1.x86_64" }, "product_reference": "xen-tools-4.7.6_04-43.39.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.7.6_04-43.39.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:xen-tools-domU-4.7.6_04-43.39.1.x86_64" }, "product_reference": "xen-tools-domU-4.7.6_04-43.39.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:xen-4.7.6_04-43.39.1.x86_64", "SUSE Enterprise Storage 4:xen-doc-html-4.7.6_04-43.39.1.x86_64", "SUSE Enterprise Storage 4:xen-libs-32bit-4.7.6_04-43.39.1.x86_64", "SUSE Enterprise Storage 4:xen-libs-4.7.6_04-43.39.1.x86_64", "SUSE Enterprise Storage 4:xen-tools-4.7.6_04-43.39.1.x86_64", "SUSE Enterprise Storage 4:xen-tools-domU-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_04-43.39.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_04-43.39.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_04-43.39.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_04-43.39.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_04-43.39.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_04-43.39.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_04-43.39.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:xen-4.7.6_04-43.39.1.x86_64", "SUSE Enterprise Storage 4:xen-doc-html-4.7.6_04-43.39.1.x86_64", "SUSE Enterprise Storage 4:xen-libs-32bit-4.7.6_04-43.39.1.x86_64", "SUSE Enterprise Storage 4:xen-libs-4.7.6_04-43.39.1.x86_64", "SUSE Enterprise Storage 4:xen-tools-4.7.6_04-43.39.1.x86_64", "SUSE Enterprise Storage 4:xen-tools-domU-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_04-43.39.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_04-43.39.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_04-43.39.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_04-43.39.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_04-43.39.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_04-43.39.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_04-43.39.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:xen-4.7.6_04-43.39.1.x86_64", "SUSE Enterprise Storage 4:xen-doc-html-4.7.6_04-43.39.1.x86_64", "SUSE Enterprise Storage 4:xen-libs-32bit-4.7.6_04-43.39.1.x86_64", "SUSE Enterprise Storage 4:xen-libs-4.7.6_04-43.39.1.x86_64", "SUSE Enterprise Storage 4:xen-tools-4.7.6_04-43.39.1.x86_64", "SUSE Enterprise Storage 4:xen-tools-domU-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.6_04-43.39.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.6_04-43.39.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.6_04-43.39.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.6_04-43.39.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.6_04-43.39.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.6_04-43.39.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.6_04-43.39.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-17T11:42:41Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2391-1
Vulnerability from csaf_suse
Published
2018-08-16 16:00
Modified
2018-08-16 16:00
Summary
Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2)
Description of the patch
This update for the Linux Kernel 4.4.114-92_64 fixes several issues.
The following security issues were fixed:
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn't properly validate the sigevent->sigev_notify field, which lead to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bsc#1103203).
before 4.14.8
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
Patchnames
SUSE-SLE-SAP-12-SP2-2018-1649,SUSE-SLE-SAP-12-SP2-2018-1650,SUSE-SLE-SAP-12-SP2-2018-1652,SUSE-SLE-SAP-12-SP2-2018-1653,SUSE-SLE-SERVER-12-SP2-2018-1649,SUSE-SLE-SERVER-12-SP2-2018-1650,SUSE-SLE-SERVER-12-SP2-2018-1652,SUSE-SLE-SERVER-12-SP2-2018-1653
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.114-92_64 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).\n- CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn\u0027t properly validate the sigevent-\u003esigev_notify field, which lead to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bsc#1103203).\nbefore 4.14.8\n- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn\u0027t propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-1649,SUSE-SLE-SAP-12-SP2-2018-1650,SUSE-SLE-SAP-12-SP2-2018-1652,SUSE-SLE-SAP-12-SP2-2018-1653,SUSE-SLE-SERVER-12-SP2-2018-1649,SUSE-SLE-SERVER-12-SP2-2018-1650,SUSE-SLE-SERVER-12-SP2-2018-1652,SUSE-SLE-SERVER-12-SP2-2018-1653", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2391-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2391-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182391-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2391-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004459.html" }, { "category": "self", "summary": "SUSE Bug 1097108", "url": "https://bugzilla.suse.com/1097108" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE Bug 1103203", "url": "https://bugzilla.suse.com/1103203" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18344 page", "url": "https://www.suse.com/security/cve/CVE-2017-18344/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-08-16T16:00:22Z", "generator": { "date": "2018-08-16T16:00:22Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2391-1", "initial_release_date": "2018-08-16T16:00:22Z", "revision_history": [ { "date": "2018-08-16T16:00:22Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64", "product_id": "kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64", "product_id": "kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64", "product_id": "kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64", "product_id": "kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-18344", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18344" } ], "notes": [ { "category": "general", "text": "The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18344", "url": "https://www.suse.com/security/cve/CVE-2017-18344" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102851 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1102851" }, { "category": "external", "summary": "SUSE Bug 1103203 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103203" }, { "category": "external", "summary": "SUSE Bug 1103580 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1103580" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2017-18344", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T16:00:22Z", "details": "moderate" } ], "title": "CVE-2017-18344" }, { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T16:00:22Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T16:00:22Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2410-2
Vulnerability from csaf_suse
Published
2018-10-18 12:49
Modified
2018-10-18 12:49
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following security issues:
- CVE-2018-3646: Systems with microprocessors utilizing speculative execution
and address translations may have allowed unauthorized disclosure of
information residing in the L1 data cache to an attacker with local user access
with guest OS privilege via a terminal page fault and a side-channel analysis
(bsc#1091107, bsc#1027519).
- Incorrect MSR_DEBUGCTL handling let guests enable BTS allowing a malicious or
buggy guest administrator can lock up the entire host (bsc#1103276)
Patchnames
SUSE-SLE-SERVER-12-SP2-BCL-2018-1664
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following security issues:\n\n- CVE-2018-3646: Systems with microprocessors utilizing speculative execution\n and address translations may have allowed unauthorized disclosure of\n information residing in the L1 data cache to an attacker with local user access\n with guest OS privilege via a terminal page fault and a side-channel analysis\n (bsc#1091107, bsc#1027519).\n- Incorrect MSR_DEBUGCTL handling let guests enable BTS allowing a malicious or\n buggy guest administrator can lock up the entire host (bsc#1103276)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-SP2-BCL-2018-1664", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2410-2.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2410-2", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182410-2/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2410-2", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004734.html" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1091107", "url": "https://bugzilla.suse.com/1091107" }, { "category": "self", "summary": "SUSE Bug 1103276", "url": "https://bugzilla.suse.com/1103276" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2018-10-18T12:49:27Z", "generator": { "date": "2018-10-18T12:49:27Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2410-2", "initial_release_date": "2018-10-18T12:49:27Z", "revision_history": [ { "date": "2018-10-18T12:49:27Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.7.6_04-43.39.1.x86_64", "product": { "name": "xen-4.7.6_04-43.39.1.x86_64", "product_id": "xen-4.7.6_04-43.39.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.7.6_04-43.39.1.x86_64", "product": { "name": "xen-doc-html-4.7.6_04-43.39.1.x86_64", "product_id": "xen-doc-html-4.7.6_04-43.39.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.7.6_04-43.39.1.x86_64", "product": { "name": "xen-libs-4.7.6_04-43.39.1.x86_64", "product_id": "xen-libs-4.7.6_04-43.39.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.7.6_04-43.39.1.x86_64", "product": { "name": "xen-libs-32bit-4.7.6_04-43.39.1.x86_64", "product_id": "xen-libs-32bit-4.7.6_04-43.39.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.7.6_04-43.39.1.x86_64", "product": { "name": "xen-tools-4.7.6_04-43.39.1.x86_64", "product_id": "xen-tools-4.7.6_04-43.39.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.7.6_04-43.39.1.x86_64", "product": { "name": "xen-tools-domU-4.7.6_04-43.39.1.x86_64", "product_id": "xen-tools-domU-4.7.6_04-43.39.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.7.6_04-43.39.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_04-43.39.1.x86_64" }, "product_reference": "xen-4.7.6_04-43.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.7.6_04-43.39.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_04-43.39.1.x86_64" }, "product_reference": "xen-doc-html-4.7.6_04-43.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.7.6_04-43.39.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_04-43.39.1.x86_64" }, "product_reference": "xen-libs-4.7.6_04-43.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.7.6_04-43.39.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_04-43.39.1.x86_64" }, "product_reference": "xen-libs-32bit-4.7.6_04-43.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.7.6_04-43.39.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_04-43.39.1.x86_64" }, "product_reference": "xen-tools-4.7.6_04-43.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.7.6_04-43.39.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_04-43.39.1.x86_64" }, "product_reference": "xen-tools-domU-4.7.6_04-43.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_04-43.39.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_04-43.39.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_04-43.39.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_04-43.39.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:49:27Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2354-1
Vulnerability from csaf_suse
Published
2018-08-16 06:04
Modified
2018-08-16 06:04
Summary
Security update for the Linux Kernel (Live Patch 31 for SLE 12)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 31 for SLE 12)
Description of the patch
This update for the Linux Kernel 3.12.61-52_119 fixes several issues.
The following security issues were fixed:
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).
- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn't propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).
Patchnames
SUSE-SLE-SERVER-12-2018-1581
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 31 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_119 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system (bsc#1099306).\n- CVE-2018-10853: A flaw was found in kvm. In which certain instructions such as sgdt/sidt call segmented_write_std didn\u0027t propagate access correctly. As such, during userspace induced exception, the guest can incorrectly assume that the exception happened in the kernel and panic. (bsc#1097108).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-1581", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2354-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2354-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182354-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2354-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004437.html" }, { "category": "self", "summary": "SUSE Bug 1097108", "url": "https://bugzilla.suse.com/1097108" }, { "category": "self", "summary": "SUSE Bug 1099306", "url": "https://bugzilla.suse.com/1099306" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10853 page", "url": "https://www.suse.com/security/cve/CVE-2018-10853/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for the Linux Kernel (Live Patch 31 for SLE 12)", "tracking": { "current_release_date": "2018-08-16T06:04:25Z", "generator": { "date": "2018-08-16T06:04:25Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2354-1", "initial_release_date": "2018-08-16T06:04:25Z", "revision_history": [ { "date": "2018-08-16T06:04:25Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_119-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_119-default-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_119-default-7-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_119-xen-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_119-xen-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_119-xen-7-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10853" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10853", "url": "https://www.suse.com/security/cve/CVE-2018-10853" }, { "category": "external", "summary": "SUSE Bug 1097104 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097104" }, { "category": "external", "summary": "SUSE Bug 1097108 for CVE-2018-10853", "url": "https://bugzilla.suse.com/1097108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:04:25Z", "details": "important" } ], "title": "CVE-2018-10853" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T06:04:25Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
suse-su-2018:2482-1
Vulnerability from csaf_suse
Published
2018-08-22 16:10
Modified
2018-08-22 16:10
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
This security issue was fixed:
- CVE-2018-3646: Systems with microprocessors utilizing speculative execution
and address translations may have allowed unauthorized disclosure of
information residing in the L1 data cache to an attacker with local user access
with guest OS privilege via a terminal page fault and a side-channel analysis
(bsc#1091107, bsc#1027519).
These non-security issues were fixed:
- bsc#1102116: SSBD is not virtualized for guests
- bsc#1092631: Preserve the xl dmesg output after boot for determining what speculative mitigations have been detected by the hypervisor.
- bsc#1101684: Make xen able to disable the visibility of the new CPU flags.
Patchnames
sdksp4-xen-13749,slessp4-xen-13749
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\nThis security issue was fixed:\n\n- CVE-2018-3646: Systems with microprocessors utilizing speculative execution\n and address translations may have allowed unauthorized disclosure of\n information residing in the L1 data cache to an attacker with local user access\n with guest OS privilege via a terminal page fault and a side-channel analysis\n (bsc#1091107, bsc#1027519).\n\nThese non-security issues were fixed:\n\n- bsc#1102116: SSBD is not virtualized for guests\n- bsc#1092631: Preserve the xl dmesg output after boot for determining what speculative mitigations have been detected by the hypervisor.\n- bsc#1101684: Make xen able to disable the visibility of the new CPU flags.\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp4-xen-13749,slessp4-xen-13749", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2482-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2482-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182482-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2482-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004492.html" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1091107", "url": "https://bugzilla.suse.com/1091107" }, { "category": "self", "summary": "SUSE Bug 1092631", "url": "https://bugzilla.suse.com/1092631" }, { "category": "self", "summary": "SUSE Bug 1101684", "url": "https://bugzilla.suse.com/1101684" }, { "category": "self", "summary": "SUSE Bug 1102116", "url": "https://bugzilla.suse.com/1102116" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2018-08-22T16:10:03Z", "generator": { "date": "2018-08-22T16:10:03Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2482-1", "initial_release_date": "2018-08-22T16:10:03Z", "revision_history": [ { "date": "2018-08-22T16:10:03Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-devel-4.4.4_36-61.37.2.i586", "product": { "name": "xen-devel-4.4.4_36-61.37.2.i586", "product_id": "xen-devel-4.4.4_36-61.37.2.i586" } }, { "category": "product_version", "name": "xen-kmp-default-4.4.4_36_3.0.101_108.68-61.37.2.i586", "product": { "name": "xen-kmp-default-4.4.4_36_3.0.101_108.68-61.37.2.i586", "product_id": "xen-kmp-default-4.4.4_36_3.0.101_108.68-61.37.2.i586" } }, { "category": "product_version", "name": "xen-kmp-pae-4.4.4_36_3.0.101_108.68-61.37.2.i586", "product": { "name": "xen-kmp-pae-4.4.4_36_3.0.101_108.68-61.37.2.i586", "product_id": "xen-kmp-pae-4.4.4_36_3.0.101_108.68-61.37.2.i586" } }, { "category": "product_version", "name": "xen-libs-4.4.4_36-61.37.2.i586", "product": { "name": "xen-libs-4.4.4_36-61.37.2.i586", "product_id": "xen-libs-4.4.4_36-61.37.2.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.4.4_36-61.37.2.i586", "product": { "name": "xen-tools-domU-4.4.4_36-61.37.2.i586", "product_id": "xen-tools-domU-4.4.4_36-61.37.2.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.4.4_36-61.37.2.x86_64", "product": { "name": "xen-devel-4.4.4_36-61.37.2.x86_64", "product_id": "xen-devel-4.4.4_36-61.37.2.x86_64" } }, { "category": "product_version", "name": "xen-4.4.4_36-61.37.2.x86_64", "product": { "name": "xen-4.4.4_36-61.37.2.x86_64", "product_id": "xen-4.4.4_36-61.37.2.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.4.4_36-61.37.2.x86_64", "product": { "name": "xen-doc-html-4.4.4_36-61.37.2.x86_64", "product_id": "xen-doc-html-4.4.4_36-61.37.2.x86_64" } }, { "category": "product_version", "name": "xen-kmp-default-4.4.4_36_3.0.101_108.68-61.37.2.x86_64", "product": { "name": "xen-kmp-default-4.4.4_36_3.0.101_108.68-61.37.2.x86_64", "product_id": "xen-kmp-default-4.4.4_36_3.0.101_108.68-61.37.2.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.4.4_36-61.37.2.x86_64", "product": { "name": "xen-libs-4.4.4_36-61.37.2.x86_64", "product_id": "xen-libs-4.4.4_36-61.37.2.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.4.4_36-61.37.2.x86_64", "product": { "name": "xen-libs-32bit-4.4.4_36-61.37.2.x86_64", "product_id": "xen-libs-32bit-4.4.4_36-61.37.2.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.4.4_36-61.37.2.x86_64", "product": { "name": "xen-tools-4.4.4_36-61.37.2.x86_64", "product_id": "xen-tools-4.4.4_36-61.37.2.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.4.4_36-61.37.2.x86_64", "product": { "name": "xen-tools-domU-4.4.4_36-61.37.2.x86_64", "product_id": "xen-tools-domU-4.4.4_36-61.37.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.4.4_36-61.37.2.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_36-61.37.2.i586" }, "product_reference": "xen-devel-4.4.4_36-61.37.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.4.4_36-61.37.2.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_36-61.37.2.x86_64" }, "product_reference": "xen-devel-4.4.4_36-61.37.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.4.4_36-61.37.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_36-61.37.2.x86_64" }, "product_reference": "xen-4.4.4_36-61.37.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.4.4_36-61.37.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_36-61.37.2.x86_64" }, "product_reference": "xen-doc-html-4.4.4_36-61.37.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.4.4_36_3.0.101_108.68-61.37.2.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_36_3.0.101_108.68-61.37.2.i586" }, "product_reference": "xen-kmp-default-4.4.4_36_3.0.101_108.68-61.37.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.4.4_36_3.0.101_108.68-61.37.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_36_3.0.101_108.68-61.37.2.x86_64" }, "product_reference": "xen-kmp-default-4.4.4_36_3.0.101_108.68-61.37.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-pae-4.4.4_36_3.0.101_108.68-61.37.2.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_36_3.0.101_108.68-61.37.2.i586" }, "product_reference": "xen-kmp-pae-4.4.4_36_3.0.101_108.68-61.37.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.4.4_36-61.37.2.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_36-61.37.2.i586" }, "product_reference": "xen-libs-4.4.4_36-61.37.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.4.4_36-61.37.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_36-61.37.2.x86_64" }, "product_reference": "xen-libs-4.4.4_36-61.37.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.4.4_36-61.37.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_36-61.37.2.x86_64" }, "product_reference": "xen-libs-32bit-4.4.4_36-61.37.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.4.4_36-61.37.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_36-61.37.2.x86_64" }, "product_reference": "xen-tools-4.4.4_36-61.37.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.4.4_36-61.37.2.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_36-61.37.2.i586" }, "product_reference": "xen-tools-domU-4.4.4_36-61.37.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.4.4_36-61.37.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_36-61.37.2.x86_64" }, "product_reference": "xen-tools-domU-4.4.4_36-61.37.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.4.4_36-61.37.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_36-61.37.2.x86_64" }, "product_reference": "xen-4.4.4_36-61.37.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.4.4_36-61.37.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_36-61.37.2.x86_64" }, "product_reference": "xen-doc-html-4.4.4_36-61.37.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.4.4_36_3.0.101_108.68-61.37.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_36_3.0.101_108.68-61.37.2.i586" }, "product_reference": "xen-kmp-default-4.4.4_36_3.0.101_108.68-61.37.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.4.4_36_3.0.101_108.68-61.37.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_36_3.0.101_108.68-61.37.2.x86_64" }, "product_reference": "xen-kmp-default-4.4.4_36_3.0.101_108.68-61.37.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-pae-4.4.4_36_3.0.101_108.68-61.37.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_36_3.0.101_108.68-61.37.2.i586" }, "product_reference": "xen-kmp-pae-4.4.4_36_3.0.101_108.68-61.37.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.4.4_36-61.37.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_36-61.37.2.i586" }, "product_reference": "xen-libs-4.4.4_36-61.37.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.4.4_36-61.37.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_36-61.37.2.x86_64" }, "product_reference": "xen-libs-4.4.4_36-61.37.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.4.4_36-61.37.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_36-61.37.2.x86_64" }, "product_reference": "xen-libs-32bit-4.4.4_36-61.37.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.4.4_36-61.37.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_36-61.37.2.x86_64" }, "product_reference": "xen-tools-4.4.4_36-61.37.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.4.4_36-61.37.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_36-61.37.2.i586" }, "product_reference": "xen-tools-domU-4.4.4_36-61.37.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.4.4_36-61.37.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_36-61.37.2.x86_64" }, "product_reference": "xen-tools-domU-4.4.4_36-61.37.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_36_3.0.101_108.68-61.37.2.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_36_3.0.101_108.68-61.37.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_36_3.0.101_108.68-61.37.2.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_36-61.37.2.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_36-61.37.2.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_36_3.0.101_108.68-61.37.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_36_3.0.101_108.68-61.37.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_36_3.0.101_108.68-61.37.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_36-61.37.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_36-61.37.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_36-61.37.2.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_36-61.37.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_36_3.0.101_108.68-61.37.2.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_36_3.0.101_108.68-61.37.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_36_3.0.101_108.68-61.37.2.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_36-61.37.2.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_36-61.37.2.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_36_3.0.101_108.68-61.37.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_36_3.0.101_108.68-61.37.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_36_3.0.101_108.68-61.37.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_36-61.37.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_36-61.37.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_36-61.37.2.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_36-61.37.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_36_3.0.101_108.68-61.37.2.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_36_3.0.101_108.68-61.37.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_36_3.0.101_108.68-61.37.2.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_36-61.37.2.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_36-61.37.2.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_36_3.0.101_108.68-61.37.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_36_3.0.101_108.68-61.37.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_36_3.0.101_108.68-61.37.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_36-61.37.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_36-61.37.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_36-61.37.2.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_36-61.37.2.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_36-61.37.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-22T16:10:03Z", "details": "important" } ], "title": "CVE-2018-3646" } ] }
rhsa-2018:2394
Vulnerability from csaf_redhat
Published
2018-08-14 20:18
Modified
2025-08-02 07:06
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)
* kernel: kvm: vmx: host GDT limit corruption (CVE-2018-10901)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646; Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting CVE-2018-3639; and Vegard Nossum (Oracle Corporation) for reporting CVE-2018-10901.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\n* kernel: kvm: vmx: host GDT limit corruption (CVE-2018-10901)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646; Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting CVE-2018-3639; and Vegard Nossum (Oracle Corporation) for reporting CVE-2018-10901.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2394", "url": "https://access.redhat.com/errata/RHSA-2018:2394" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/ssbd", "url": "https://access.redhat.com/security/vulnerabilities/ssbd" }, { "category": "external", "summary": "1566890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890" }, { "category": "external", "summary": "1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "1601849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601849" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2394.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-08-02T07:06:20+00:00", "generator": { "date": "2025-08-02T07:06:20+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2394", "initial_release_date": "2018-08-14T20:18:50+00:00", "revision_history": [ { "date": "2018-08-14T20:18:50+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-08-14T20:18:50+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T07:06:20+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 6.4)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.4::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-358.91.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-358.91.4.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-358.91.4.el6.x86_64", "product_id": "python-perf-0:2.6.32-358.91.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-358.91.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-358.91.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-358.91.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-358.91.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-358.91.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-358.91.4.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-358.91.4.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-358.91.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-358.91.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-358.91.4.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-358.91.4.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-358.91.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-358.91.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-358.91.4.el6.x86_64", "product": { "name": "kernel-0:2.6.32-358.91.4.el6.x86_64", "product_id": "kernel-0:2.6.32-358.91.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-358.91.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-358.91.4.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-358.91.4.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-358.91.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-358.91.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-358.91.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-358.91.4.el6.x86_64", "product": { "name": "perf-0:2.6.32-358.91.4.el6.x86_64", "product_id": "perf-0:2.6.32-358.91.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-358.91.4.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-358.91.4.el6.src", "product": { "name": "kernel-0:2.6.32-358.91.4.el6.src", "product_id": "kernel-0:2.6.32-358.91.4.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-358.91.4.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.32-358.91.4.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-358.91.4.el6.noarch", "product_id": "kernel-doc-0:2.6.32-358.91.4.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-358.91.4.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-358.91.4.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-358.91.4.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-358.91.4.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-358.91.4.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-358.91.4.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src" }, "product_reference": "kernel-0:2.6.32-358.91.4.el6.src", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-358.91.4.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-358.91.4.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-358.91.4.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-358.91.4.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-358.91.4.el6.noarch", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-358.91.4.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-358.91.4.el6.noarch", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-358.91.4.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64" }, "product_reference": "perf-0:2.6.32-358.91.4.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-358.91.4.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-358.91.4.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src" }, "product_reference": "kernel-0:2.6.32-358.91.4.el6.src", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-358.91.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-358.91.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-358.91.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-358.91.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-358.91.4.el6.noarch", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-358.91.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-358.91.4.el6.noarch", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-358.91.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64" }, "product_reference": "perf-0:2.6.32-358.91.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-358.91.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3620", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:18:50+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2394" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Jann Horn" ], "organization": "Google Project Zero" }, { "names": [ "Ken Johnson" ], "organization": "Microsoft Security Response Center" } ], "cve": "CVE-2018-3639", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1566890" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative store bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3639" }, { "category": "external", "summary": "RHBZ#1566890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3639" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/ssbd", "url": "https://access.redhat.com/security/vulnerabilities/ssbd" }, { "category": "external", "summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528", "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528" }, { "category": "external", "summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf", "url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf" }, { "category": "external", "summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf", "url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html" } ], "release_date": "2018-05-21T21:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:18:50+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2394" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative store bypass" }, { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3646", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3646", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3646" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:18:50+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2394" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Vegard Nossum" ], "organization": "Oracle Corporation" } ], "cve": "CVE-2018-10901", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "discovery_date": "2018-06-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601849" } ], "notes": [ { "category": "description", "text": "A flaw was found in Linux kernel\u0027s KVM virtualization subsystem. The VMX code does not restore the GDT.LIMIT to the previous host value, but instead sets it to 64KB. With a corrupted GDT limit a host\u0027s userspace code has an ability to place malicious entries in the GDT, particularly to the per-cpu variables. An attacker can use this to escalate their privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: kvm: vmx: host GDT limit corruption", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10901" }, { "category": "external", "summary": "RHBZ#1601849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601849" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10901", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10901" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10901", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10901" } ], "release_date": "2010-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:18:50+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2394" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: kvm: vmx: host GDT limit corruption" } ] }
rhsa-2018:2402
Vulnerability from csaf_redhat
Published
2018-08-16 06:10
Modified
2025-08-02 07:06
Summary
Red Hat Security Advisory: rhvm-appliance security update
Notes
Topic
An update for rhvm-appliance is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The RHV-M Virtual Appliance automates the process of installing and configuring the Red Hat Virtualization Manager. The appliance is available to download as an OVA file from the Customer Portal.
Security Fix(es):
* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)
* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)
Red Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646 and Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rhvm-appliance is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The RHV-M Virtual Appliance automates the process of installing and configuring the Red Hat Virtualization Manager. The appliance is available to download as an OVA file from the Customer Portal.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\n* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646 and Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2402", "url": "https://access.redhat.com/errata/RHSA-2018:2402" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "1614066", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1614066" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2402.json" } ], "title": "Red Hat Security Advisory: rhvm-appliance security update", "tracking": { "current_release_date": "2025-08-02T07:06:02+00:00", "generator": { "date": "2025-08-02T07:06:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2402", "initial_release_date": "2018-08-16T06:10:06+00:00", "revision_history": [ { "date": "2018-08-16T06:10:06+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-08-16T06:10:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T07:06:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product": { "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } }, { "category": "product_name", "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7", "product": { "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "rhvm-appliance-2:4.2-20180813.0.el7.src", "product": { "name": "rhvm-appliance-2:4.2-20180813.0.el7.src", "product_id": "rhvm-appliance-2:4.2-20180813.0.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhvm-appliance@4.2-20180813.0.el7?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rhvm-appliance-2:4.2-20180813.0.el7.noarch", "product": { "name": "rhvm-appliance-2:4.2-20180813.0.el7.noarch", "product_id": "rhvm-appliance-2:4.2-20180813.0.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhvm-appliance@4.2-20180813.0.el7?arch=noarch\u0026epoch=2" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhvm-appliance-2:4.2-20180813.0.el7.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch" }, "product_reference": "rhvm-appliance-2:4.2-20180813.0.el7.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "rhvm-appliance-2:4.2-20180813.0.el7.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.src" }, "product_reference": "rhvm-appliance-2:4.2-20180813.0.el7.src", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "rhvm-appliance-2:4.2-20180813.0.el7.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch" }, "product_reference": "rhvm-appliance-2:4.2-20180813.0.el7.noarch", "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7" }, { "category": "default_component_of", "full_product_name": { "name": "rhvm-appliance-2:4.2-20180813.0.el7.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.src" }, "product_reference": "rhvm-appliance-2:4.2-20180813.0.el7.src", "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3620", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.src", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T06:10:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.src", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2402" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.src", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3646", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.src", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3646", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3646" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T06:10:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.src", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2402" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.src", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5390", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601704" } ], "notes": [ { "category": "description", "text": "A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.src", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "RHBZ#1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5390", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/962459", "url": "https://www.kb.cert.org/vuls/id/962459" }, { "category": "external", "summary": "https://www.spinics.net/lists/netdev/msg514742.html", "url": "https://www.spinics.net/lists/netdev/msg514742.html" } ], "release_date": "2018-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T06:10:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.src", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2402" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Agents-7:rhvm-appliance-2:4.2-20180813.0.el7.src", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.noarch", "7Server-RHEV-4-Hypervisor-7:rhvm-appliance-2:4.2-20180813.0.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)" } ] }
rhsa-2018:2391
Vulnerability from csaf_redhat
Published
2018-08-14 21:02
Modified
2025-08-02 07:06
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)
* kernel: kvm: vmx: host GDT limit corruption (CVE-2018-10901)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646 and Vegard Nossum (Oracle Corporation) for reporting CVE-2018-10901.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\n* kernel: kvm: vmx: host GDT limit corruption (CVE-2018-10901)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646 and Vegard Nossum (Oracle Corporation) for reporting CVE-2018-10901.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2391", "url": "https://access.redhat.com/errata/RHSA-2018:2391" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "1601849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601849" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2391.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-08-02T07:06:25+00:00", "generator": { "date": "2025-08-02T07:06:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2391", "initial_release_date": "2018-08-14T21:02:37+00:00", "revision_history": [ { "date": "2018-08-14T21:02:37+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-08-14T21:02:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T07:06:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-573.60.4.el6.x86_64", "product": { "name": "kernel-0:2.6.32-573.60.4.el6.x86_64", "product_id": "kernel-0:2.6.32-573.60.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.60.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.60.4.el6.x86_64", "product": { "name": "perf-0:2.6.32-573.60.4.el6.x86_64", "product_id": "perf-0:2.6.32-573.60.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.60.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-573.60.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.60.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.60.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.60.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.60.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.60.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.60.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.60.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.60.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-573.60.4.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-573.60.4.el6.x86_64", "product_id": "python-perf-0:2.6.32-573.60.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.60.4.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "product": { "name": "kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "product_id": "kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.60.4.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "product": { "name": "perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "product_id": "perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.60.4.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "product_id": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.60.4.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "product": { "name": "kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "product_id": "kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.60.4.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "product": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "product_id": "kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-573.60.4.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.60.4.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-573.60.4.el6.i686", "product": { "name": "python-perf-0:2.6.32-573.60.4.el6.i686", "product_id": "python-perf-0:2.6.32-573.60.4.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.60.4.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.60.4.el6.i686", "product": { "name": "kernel-0:2.6.32-573.60.4.el6.i686", "product_id": "kernel-0:2.6.32-573.60.4.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.60.4.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.60.4.el6.i686", "product": { "name": "perf-0:2.6.32-573.60.4.el6.i686", "product_id": "perf-0:2.6.32-573.60.4.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.60.4.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.60.4.el6.i686", "product": { "name": "kernel-headers-0:2.6.32-573.60.4.el6.i686", "product_id": "kernel-headers-0:2.6.32-573.60.4.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.60.4.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.60.4.el6.i686", "product": { "name": "kernel-debug-0:2.6.32-573.60.4.el6.i686", "product_id": "kernel-debug-0:2.6.32-573.60.4.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.60.4.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.60.4.el6.i686", "product": { "name": "kernel-devel-0:2.6.32-573.60.4.el6.i686", "product_id": "kernel-devel-0:2.6.32-573.60.4.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.60.4.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-573.60.4.el6.src", "product": { "name": "kernel-0:2.6.32-573.60.4.el6.src", "product_id": "kernel-0:2.6.32-573.60.4.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.60.4.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-573.60.4.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:2.6.32-573.60.4.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-573.60.4.el6.noarch", "product_id": "kernel-doc-0:2.6.32-573.60.4.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-573.60.4.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-573.60.4.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "product": { "name": "perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "product_id": "perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.60.4.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "product_id": "kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-573.60.4.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-573.60.4.el6.s390x", "product": { "name": "python-perf-0:2.6.32-573.60.4.el6.s390x", "product_id": "python-perf-0:2.6.32-573.60.4.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.60.4.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "product_id": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.60.4.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-573.60.4.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "product": { "name": "kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "product_id": "kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.60.4.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.60.4.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.60.4.el6.s390x", "product": { "name": "kernel-0:2.6.32-573.60.4.el6.s390x", "product_id": "kernel-0:2.6.32-573.60.4.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.60.4.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.60.4.el6.s390x", "product": { "name": "perf-0:2.6.32-573.60.4.el6.s390x", "product_id": "perf-0:2.6.32-573.60.4.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.60.4.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.60.4.el6.s390x", "product": { "name": "kernel-headers-0:2.6.32-573.60.4.el6.s390x", "product_id": "kernel-headers-0:2.6.32-573.60.4.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.60.4.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "product_id": "kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-573.60.4.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "product": { "name": "kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "product_id": "kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.60.4.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.60.4.el6.s390x", "product": { "name": "kernel-debug-0:2.6.32-573.60.4.el6.s390x", "product_id": "kernel-debug-0:2.6.32-573.60.4.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.60.4.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.60.4.el6.s390x", "product": { "name": "kernel-devel-0:2.6.32-573.60.4.el6.s390x", "product_id": "kernel-devel-0:2.6.32-573.60.4.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.60.4.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "product": { "name": "kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "product_id": "kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-573.60.4.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "product": { "name": "perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "product_id": "perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.60.4.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-573.60.4.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-573.60.4.el6.ppc64", "product": { "name": "python-perf-0:2.6.32-573.60.4.el6.ppc64", "product_id": "python-perf-0:2.6.32-573.60.4.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.60.4.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "product_id": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.60.4.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "product_id": "kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.60.4.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.60.4.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.60.4.el6.ppc64", "product": { "name": "kernel-0:2.6.32-573.60.4.el6.ppc64", "product_id": "kernel-0:2.6.32-573.60.4.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.60.4.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.60.4.el6.ppc64", "product": { "name": "perf-0:2.6.32-573.60.4.el6.ppc64", "product_id": "perf-0:2.6.32-573.60.4.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.60.4.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "product": { "name": "kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "product_id": "kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-573.60.4.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "product": { "name": "kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "product_id": "kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.60.4.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "product_id": "kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.60.4.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "product": { "name": "kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "product_id": "kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.60.4.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "product": { "name": "kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "product_id": "kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.60.4.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.60.4.el6.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src" }, "product_reference": "kernel-0:2.6.32-573.60.4.el6.src", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.60.4.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.60.4.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.60.4.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "perf-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.60.4.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src" }, "product_reference": "kernel-0:2.6.32-573.60.4.el6.src", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.60.4.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.60.4.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.60.4.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "perf-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.60.4.el6.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src" }, "product_reference": "kernel-0:2.6.32-573.60.4.el6.src", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.60.4.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.60.4.el6.noarch", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.60.4.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "perf-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.60.4.el6.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src" }, "product_reference": "kernel-0:2.6.32-573.60.4.el6.src", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.60.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.60.4.el6.noarch", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.60.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "perf-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3620", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T21:02:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2391" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3646", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3646", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3646" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T21:02:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2391" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Vegard Nossum" ], "organization": "Oracle Corporation" } ], "cve": "CVE-2018-10901", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "discovery_date": "2018-06-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601849" } ], "notes": [ { "category": "description", "text": "A flaw was found in Linux kernel\u0027s KVM virtualization subsystem. The VMX code does not restore the GDT.LIMIT to the previous host value, but instead sets it to 64KB. With a corrupted GDT limit a host\u0027s userspace code has an ability to place malicious entries in the GDT, particularly to the per-cpu variables. An attacker can use this to escalate their privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: kvm: vmx: host GDT limit corruption", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10901" }, { "category": "external", "summary": "RHBZ#1601849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601849" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10901", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10901" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10901", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10901" } ], "release_date": "2010-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T21:02:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2391" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.4.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.60.4.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.60.4.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.4.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.4.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: kvm: vmx: host GDT limit corruption" } ] }
rhsa-2018:2396
Vulnerability from csaf_redhat
Published
2018-08-14 20:17
Modified
2025-08-02 07:06
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise MRG 2.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)
Red Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646 and Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting CVE-2018-3639.
Bug Fix(es):
* The kernel-rt packages have been upgraded to the 3.10.0-693.37.1 source tree, which provides a number of bug fixes over the previous version. (BZ#1599860)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise MRG 2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646 and Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting CVE-2018-3639.\n\nBug Fix(es):\n\n* The kernel-rt packages have been upgraded to the 3.10.0-693.37.1 source tree, which provides a number of bug fixes over the previous version. (BZ#1599860)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2396", "url": "https://access.redhat.com/errata/RHSA-2018:2396" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "1566890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890" }, { "category": "external", "summary": "1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "1599860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1599860" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2396.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2025-08-02T07:06:42+00:00", "generator": { "date": "2025-08-02T07:06:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2396", "initial_release_date": "2018-08-14T20:17:22+00:00", "revision_history": [ { "date": "2018-08-14T20:17:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-08-14T20:17:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T07:06:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat MRG Realtime for RHEL 6 Server v.2", "product": { "name": "Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-6" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-firmware-1:3.10.0-693.37.4.rt56.629.el6rt.noarch", "product": { "name": "kernel-rt-firmware-1:3.10.0-693.37.4.rt56.629.el6rt.noarch", "product_id": "kernel-rt-firmware-1:3.10.0-693.37.4.rt56.629.el6rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-firmware@3.10.0-693.37.4.rt56.629.el6rt?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-doc-1:3.10.0-693.37.4.rt56.629.el6rt.noarch", "product": { "name": "kernel-rt-doc-1:3.10.0-693.37.4.rt56.629.el6rt.noarch", "product_id": "kernel-rt-doc-1:3.10.0-693.37.4.rt56.629.el6rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-693.37.4.rt56.629.el6rt?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product_id": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@3.10.0-693.37.4.rt56.629.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product_id": "kernel-rt-vanilla-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@3.10.0-693.37.4.rt56.629.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product": { "name": "kernel-rt-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product_id": "kernel-rt-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-693.37.4.rt56.629.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product": { "name": "kernel-rt-debug-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product_id": "kernel-rt-debug-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-693.37.4.rt56.629.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product": { "name": "kernel-rt-trace-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product_id": "kernel-rt-trace-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-693.37.4.rt56.629.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product": { "name": "kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product_id": "kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.37.4.rt56.629.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product_id": "kernel-rt-vanilla-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@3.10.0-693.37.4.rt56.629.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product": { "name": "kernel-rt-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product_id": "kernel-rt-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-693.37.4.rt56.629.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-693.37.4.rt56.629.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product_id": "kernel-rt-trace-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-693.37.4.rt56.629.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product": { "name": "kernel-rt-debug-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product_id": "kernel-rt-debug-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-693.37.4.rt56.629.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product_id": "kernel-rt-debug-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-693.37.4.rt56.629.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product": { "name": "kernel-rt-trace-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product_id": "kernel-rt-trace-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-693.37.4.rt56.629.el6rt?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.src", "product": { "name": "kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.src", "product_id": "kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.37.4.rt56.629.el6rt?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.src as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.src" }, "product_reference": "kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.src", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64" }, "product_reference": "kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64" }, "product_reference": "kernel-rt-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-1:3.10.0-693.37.4.rt56.629.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.37.4.rt56.629.el6rt.noarch" }, "product_reference": "kernel-rt-doc-1:3.10.0-693.37.4.rt56.629.el6rt.noarch", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-firmware-1:3.10.0-693.37.4.rt56.629.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.37.4.rt56.629.el6rt.noarch" }, "product_reference": "kernel-rt-firmware-1:3.10.0-693.37.4.rt56.629.el6rt.noarch", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3620", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.37.4.rt56.629.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.37.4.rt56.629.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:17:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.37.4.rt56.629.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.37.4.rt56.629.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2396" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.37.4.rt56.629.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.37.4.rt56.629.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Jann Horn" ], "organization": "Google Project Zero" }, { "names": [ "Ken Johnson" ], "organization": "Microsoft Security Response Center" } ], "cve": "CVE-2018-3639", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1566890" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative store bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.37.4.rt56.629.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.37.4.rt56.629.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3639" }, { "category": "external", "summary": "RHBZ#1566890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3639" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/ssbd", "url": "https://access.redhat.com/security/vulnerabilities/ssbd" }, { "category": "external", "summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528", "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528" }, { "category": "external", "summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf", "url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf" }, { "category": "external", "summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf", "url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html" } ], "release_date": "2018-05-21T21:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:17:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.37.4.rt56.629.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.37.4.rt56.629.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2396" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.37.4.rt56.629.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.37.4.rt56.629.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative store bypass" }, { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3646", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.37.4.rt56.629.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.37.4.rt56.629.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3646", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3646" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:17:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.37.4.rt56.629.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.37.4.rt56.629.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2396" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.37.4.rt56.629.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.37.4.rt56.629.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" } ] }
rhsa-2018:2602
Vulnerability from csaf_redhat
Published
2018-08-29 18:29
Modified
2025-08-02 07:06
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 5 Extended Lifecycle Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)
Red Hat would like to thank Intel OSSIRT (Intel.com) for reporting these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 5 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2602", "url": "https://access.redhat.com/errata/RHSA-2018:2602" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2602.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-08-02T07:06:53+00:00", "generator": { "date": "2025-08-02T07:06:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2602", "initial_release_date": "2018-08-29T18:29:49+00:00", "revision_history": [ { "date": "2018-08-29T18:29:49+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-08-29T18:29:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T07:06:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 5 ELS)", "product": { "name": "Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:5" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-434.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-434.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-434.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-434.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-434.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-434.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-434.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-434.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-434.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-434.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-434.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-434.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-434.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-434.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-434.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-434.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-434.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-434.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-434.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-434.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-434.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-434.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-434.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-434.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-434.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-434.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-434.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-434.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-434.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-434.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-434.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-434.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-434.el5.x86_64", "product": { "name": "kernel-0:2.6.18-434.el5.x86_64", "product_id": "kernel-0:2.6.18-434.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-434.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-434.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-434.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-434.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-434.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-434.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-434.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-434.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-434.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-434.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-434.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-434.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-434.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-434.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-434.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-434.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-434.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-434.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-434.el5.i686", "product_id": "kernel-devel-0:2.6.18-434.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-434.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-434.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-434.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-434.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-434.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-434.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-434.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-434.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-434.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-434.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-434.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-434.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-434.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-434.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-434.el5.i686", "product_id": "kernel-xen-0:2.6.18-434.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-434.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-434.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-434.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-434.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-434.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-434.el5.i686", "product": { "name": "kernel-0:2.6.18-434.el5.i686", "product_id": "kernel-0:2.6.18-434.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-434.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-434.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-434.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-434.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-434.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-434.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-434.el5.i686", "product_id": "kernel-PAE-0:2.6.18-434.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-434.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-434.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-434.el5.i686", "product_id": "kernel-debug-0:2.6.18-434.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-434.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-434.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-434.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-434.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-434.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-434.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-434.el5.i386", "product_id": "kernel-headers-0:2.6.18-434.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-434.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-434.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-434.el5.noarch", "product_id": "kernel-doc-0:2.6.18-434.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-434.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-434.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-434.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-434.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-434.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-434.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-434.el5.s390x", "product_id": "kernel-devel-0:2.6.18-434.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-434.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-434.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-434.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-434.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-434.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-434.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-434.el5.s390x", "product_id": "kernel-headers-0:2.6.18-434.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-434.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-434.el5.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.18-434.el5.s390x", "product_id": "kernel-kdump-devel-0:2.6.18-434.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-434.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-434.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-434.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-434.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-434.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-434.el5.s390x", "product": { "name": "kernel-0:2.6.18-434.el5.s390x", "product_id": "kernel-0:2.6.18-434.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-434.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-434.el5.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-434.el5.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.18-434.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-434.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-434.el5.s390x", "product": { "name": "kernel-kdump-0:2.6.18-434.el5.s390x", "product_id": "kernel-kdump-0:2.6.18-434.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-434.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-434.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-434.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-434.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-434.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-434.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-434.el5.s390x", "product_id": "kernel-debug-0:2.6.18-434.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-434.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-434.el5.src", "product": { "name": "kernel-0:2.6.18-434.el5.src", "product_id": "kernel-0:2.6.18-434.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-434.el5?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-434.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-0:2.6.18-434.el5.i686" }, "product_reference": "kernel-0:2.6.18-434.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-434.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-0:2.6.18-434.el5.s390x" }, "product_reference": "kernel-0:2.6.18-434.el5.s390x", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-434.el5.src as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-0:2.6.18-434.el5.src" }, "product_reference": "kernel-0:2.6.18-434.el5.src", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-434.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-0:2.6.18-434.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-434.el5.x86_64", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-434.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-PAE-0:2.6.18-434.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-434.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-434.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-PAE-debuginfo-0:2.6.18-434.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-434.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-434.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-PAE-devel-0:2.6.18-434.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-434.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-434.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debug-0:2.6.18-434.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-434.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-434.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debug-0:2.6.18-434.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-434.el5.s390x", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-434.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debug-0:2.6.18-434.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-434.el5.x86_64", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-434.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-434.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-434.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-434.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-434.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-434.el5.s390x", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-434.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-434.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-434.el5.x86_64", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-434.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debug-devel-0:2.6.18-434.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-434.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-434.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debug-devel-0:2.6.18-434.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-434.el5.s390x", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-434.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debug-devel-0:2.6.18-434.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-434.el5.x86_64", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-434.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debuginfo-0:2.6.18-434.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-434.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-434.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debuginfo-0:2.6.18-434.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-434.el5.s390x", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-434.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debuginfo-0:2.6.18-434.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-434.el5.x86_64", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-434.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debuginfo-common-0:2.6.18-434.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-434.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-434.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debuginfo-common-0:2.6.18-434.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-434.el5.s390x", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-434.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debuginfo-common-0:2.6.18-434.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-434.el5.x86_64", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-434.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-devel-0:2.6.18-434.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-434.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-434.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-devel-0:2.6.18-434.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-434.el5.s390x", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-434.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-devel-0:2.6.18-434.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-434.el5.x86_64", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-434.el5.noarch as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-doc-0:2.6.18-434.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-434.el5.noarch", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-434.el5.i386 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-headers-0:2.6.18-434.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-434.el5.i386", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-434.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-headers-0:2.6.18-434.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-434.el5.s390x", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-434.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-headers-0:2.6.18-434.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-434.el5.x86_64", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-434.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-kdump-0:2.6.18-434.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-434.el5.s390x", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-434.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-kdump-debuginfo-0:2.6.18-434.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-434.el5.s390x", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-434.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-kdump-devel-0:2.6.18-434.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-434.el5.s390x", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-434.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-xen-0:2.6.18-434.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-434.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-434.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-xen-0:2.6.18-434.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-434.el5.x86_64", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-434.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-434.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-434.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-434.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-434.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-434.el5.x86_64", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-434.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-xen-devel-0:2.6.18-434.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-434.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-434.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-xen-devel-0:2.6.18-434.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-434.el5.x86_64", "relates_to_product_reference": "5Server-ELS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3620", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-ELS:kernel-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-0:2.6.18-434.el5.src", "5Server-ELS:kernel-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-PAE-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-PAE-debuginfo-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-PAE-devel-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debug-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debug-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-debug-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-debug-devel-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debug-devel-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-debug-devel-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-debuginfo-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debuginfo-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-debuginfo-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-devel-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-devel-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-devel-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-doc-0:2.6.18-434.el5.noarch", "5Server-ELS:kernel-headers-0:2.6.18-434.el5.i386", "5Server-ELS:kernel-headers-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-headers-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-kdump-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-kdump-debuginfo-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-kdump-devel-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-xen-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-xen-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-xen-devel-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-xen-devel-0:2.6.18-434.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-29T18:29:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "5Server-ELS:kernel-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-0:2.6.18-434.el5.src", "5Server-ELS:kernel-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-PAE-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-PAE-debuginfo-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-PAE-devel-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debug-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debug-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-debug-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-debug-devel-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debug-devel-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-debug-devel-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-debuginfo-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debuginfo-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-debuginfo-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-devel-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-devel-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-devel-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-doc-0:2.6.18-434.el5.noarch", "5Server-ELS:kernel-headers-0:2.6.18-434.el5.i386", "5Server-ELS:kernel-headers-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-headers-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-kdump-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-kdump-debuginfo-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-kdump-devel-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-xen-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-xen-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-xen-devel-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-xen-devel-0:2.6.18-434.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2602" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "5Server-ELS:kernel-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-0:2.6.18-434.el5.src", "5Server-ELS:kernel-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-PAE-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-PAE-debuginfo-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-PAE-devel-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debug-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debug-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-debug-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-debug-devel-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debug-devel-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-debug-devel-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-debuginfo-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debuginfo-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-debuginfo-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-devel-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-devel-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-devel-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-doc-0:2.6.18-434.el5.noarch", "5Server-ELS:kernel-headers-0:2.6.18-434.el5.i386", "5Server-ELS:kernel-headers-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-headers-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-kdump-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-kdump-debuginfo-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-kdump-devel-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-xen-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-xen-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-xen-devel-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-xen-devel-0:2.6.18-434.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3646", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-ELS:kernel-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-0:2.6.18-434.el5.src", "5Server-ELS:kernel-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-PAE-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-PAE-debuginfo-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-PAE-devel-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debug-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debug-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-debug-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-debug-devel-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debug-devel-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-debug-devel-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-debuginfo-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debuginfo-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-debuginfo-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-devel-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-devel-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-devel-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-doc-0:2.6.18-434.el5.noarch", "5Server-ELS:kernel-headers-0:2.6.18-434.el5.i386", "5Server-ELS:kernel-headers-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-headers-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-kdump-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-kdump-debuginfo-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-kdump-devel-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-xen-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-xen-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-xen-devel-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-xen-devel-0:2.6.18-434.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3646", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3646" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-29T18:29:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "5Server-ELS:kernel-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-0:2.6.18-434.el5.src", "5Server-ELS:kernel-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-PAE-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-PAE-debuginfo-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-PAE-devel-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debug-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debug-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-debug-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-debug-devel-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debug-devel-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-debug-devel-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-debuginfo-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debuginfo-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-debuginfo-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-devel-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-devel-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-devel-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-doc-0:2.6.18-434.el5.noarch", "5Server-ELS:kernel-headers-0:2.6.18-434.el5.i386", "5Server-ELS:kernel-headers-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-headers-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-kdump-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-kdump-debuginfo-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-kdump-devel-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-xen-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-xen-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-xen-devel-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-xen-devel-0:2.6.18-434.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2602" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "5Server-ELS:kernel-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-0:2.6.18-434.el5.src", "5Server-ELS:kernel-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-PAE-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-PAE-debuginfo-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-PAE-devel-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debug-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debug-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-debug-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-debug-devel-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debug-devel-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-debug-devel-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-debuginfo-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debuginfo-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-debuginfo-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-devel-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-devel-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-devel-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-doc-0:2.6.18-434.el5.noarch", "5Server-ELS:kernel-headers-0:2.6.18-434.el5.i386", "5Server-ELS:kernel-headers-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-headers-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-kdump-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-kdump-debuginfo-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-kdump-devel-0:2.6.18-434.el5.s390x", "5Server-ELS:kernel-xen-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-xen-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-434.el5.x86_64", "5Server-ELS:kernel-xen-devel-0:2.6.18-434.el5.i686", "5Server-ELS:kernel-xen-devel-0:2.6.18-434.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" } ] }
rhsa-2018:2393
Vulnerability from csaf_redhat
Published
2018-08-14 20:19
Modified
2025-08-02 07:06
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)
* kernel: kvm: vmx: host GDT limit corruption (CVE-2018-10901)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646 and Vegard Nossum (Oracle Corporation) for reporting CVE-2018-10901.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\n* kernel: kvm: vmx: host GDT limit corruption (CVE-2018-10901)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646 and Vegard Nossum (Oracle Corporation) for reporting CVE-2018-10901.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2393", "url": "https://access.redhat.com/errata/RHSA-2018:2393" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "1601849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601849" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2393.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-08-02T07:06:37+00:00", "generator": { "date": "2025-08-02T07:06:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2393", "initial_release_date": "2018-08-14T20:19:15+00:00", "revision_history": [ { "date": "2018-08-14T20:19:15+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-08-14T20:19:15+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T07:06:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 6.5)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "python-perf-0:2.6.32-431.91.3.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-431.91.3.el6.x86_64", "product_id": "python-perf-0:2.6.32-431.91.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-431.91.3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-431.91.3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-431.91.3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-431.91.3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.91.3.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.91.3.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-431.91.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-431.91.3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-431.91.3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-431.91.3.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-431.91.3.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-431.91.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-431.91.3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-431.91.3.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-431.91.3.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-431.91.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-431.91.3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-431.91.3.el6.x86_64", "product": { "name": "perf-0:2.6.32-431.91.3.el6.x86_64", "product_id": "perf-0:2.6.32-431.91.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-431.91.3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-431.91.3.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-431.91.3.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-431.91.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-431.91.3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-431.91.3.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-431.91.3.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-431.91.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-431.91.3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-431.91.3.el6.x86_64", "product": { "name": "kernel-0:2.6.32-431.91.3.el6.x86_64", "product_id": "kernel-0:2.6.32-431.91.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-431.91.3.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-431.91.3.el6.src", "product": { "name": "kernel-0:2.6.32-431.91.3.el6.src", "product_id": "kernel-0:2.6.32-431.91.3.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-431.91.3.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.32-431.91.3.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-431.91.3.el6.noarch", "product_id": "kernel-doc-0:2.6.32-431.91.3.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-431.91.3.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-431.91.3.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-431.91.3.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-431.91.3.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-431.91.3.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-431.91.3.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-431.91.3.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-431.91.3.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-431.91.3.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-431.91.3.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.src" }, "product_reference": "kernel-0:2.6.32-431.91.3.el6.src", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-431.91.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-431.91.3.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-431.91.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.91.3.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-431.91.3.el6.noarch", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-431.91.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.91.3.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-431.91.3.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-431.91.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.91.3.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-431.91.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.91.3.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-431.91.3.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-431.91.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.91.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.91.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.91.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.91.3.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-431.91.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.91.3.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-431.91.3.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-431.91.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.91.3.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-431.91.3.el6.noarch", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-431.91.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.91.3.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-431.91.3.el6.noarch", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-431.91.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.91.3.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-431.91.3.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-431.91.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:perf-0:2.6.32-431.91.3.el6.x86_64" }, "product_reference": "perf-0:2.6.32-431.91.3.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-431.91.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:python-perf-0:2.6.32-431.91.3.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-431.91.3.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-431.91.3.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.src" }, "product_reference": "kernel-0:2.6.32-431.91.3.el6.src", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-431.91.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-431.91.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-431.91.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.91.3.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-431.91.3.el6.noarch", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-431.91.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.91.3.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-431.91.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-431.91.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.91.3.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-431.91.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.91.3.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-431.91.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-431.91.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.91.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.91.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.91.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.91.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-431.91.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.91.3.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-431.91.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-431.91.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.91.3.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-431.91.3.el6.noarch", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-431.91.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.91.3.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-431.91.3.el6.noarch", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-431.91.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.91.3.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-431.91.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-431.91.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:perf-0:2.6.32-431.91.3.el6.x86_64" }, "product_reference": "perf-0:2.6.32-431.91.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-431.91.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.91.3.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-431.91.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3620", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.91.3.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.91.3.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.91.3.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.91.3.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.91.3.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.91.3.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:19:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.91.3.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.91.3.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.91.3.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.91.3.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.91.3.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.91.3.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2393" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.91.3.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.91.3.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.91.3.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.91.3.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.91.3.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.91.3.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3646", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.91.3.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.91.3.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.91.3.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.91.3.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.91.3.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.91.3.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3646", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3646" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:19:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.91.3.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.91.3.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.91.3.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.91.3.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.91.3.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.91.3.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2393" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.91.3.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.91.3.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.91.3.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.91.3.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.91.3.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.91.3.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Vegard Nossum" ], "organization": "Oracle Corporation" } ], "cve": "CVE-2018-10901", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "discovery_date": "2018-06-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601849" } ], "notes": [ { "category": "description", "text": "A flaw was found in Linux kernel\u0027s KVM virtualization subsystem. The VMX code does not restore the GDT.LIMIT to the previous host value, but instead sets it to 64KB. With a corrupted GDT limit a host\u0027s userspace code has an ability to place malicious entries in the GDT, particularly to the per-cpu variables. An attacker can use this to escalate their privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: kvm: vmx: host GDT limit corruption", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.91.3.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.91.3.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.91.3.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.91.3.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.91.3.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.91.3.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10901" }, { "category": "external", "summary": "RHBZ#1601849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601849" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10901", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10901" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10901", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10901" } ], "release_date": "2010-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:19:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.91.3.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.91.3.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.91.3.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.91.3.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.91.3.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.91.3.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2393" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.91.3.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.91.3.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.91.3.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.91.3.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.91.3.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.91.3.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.91.3.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.91.3.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: kvm: vmx: host GDT limit corruption" } ] }
rhsa-2018:2392
Vulnerability from csaf_redhat
Published
2018-08-14 20:18
Modified
2025-08-02 07:06
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support and Red Hat Enterprise Linux 6.6 Telco Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)
* kernel: kvm: vmx: host GDT limit corruption (CVE-2018-10901)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646 and Vegard Nossum (Oracle Corporation) for reporting CVE-2018-10901.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support and Red Hat Enterprise Linux 6.6 Telco Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\n* kernel: kvm: vmx: host GDT limit corruption (CVE-2018-10901)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646 and Vegard Nossum (Oracle Corporation) for reporting CVE-2018-10901.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2392", "url": "https://access.redhat.com/errata/RHSA-2018:2392" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "1601849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601849" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2392.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-08-02T07:06:31+00:00", "generator": { "date": "2025-08-02T07:06:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2392", "initial_release_date": "2018-08-14T20:18:02+00:00", "revision_history": [ { "date": "2018-08-14T20:18:02+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-08-14T20:18:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T07:06:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server TUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:6.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:6.6::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-504.72.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-504.72.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-504.72.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-504.72.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-504.72.4.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-504.72.4.el6.x86_64", "product_id": "python-perf-0:2.6.32-504.72.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-504.72.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-504.72.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-504.72.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-504.72.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-504.72.4.el6.x86_64", "product": { "name": "kernel-0:2.6.32-504.72.4.el6.x86_64", "product_id": "kernel-0:2.6.32-504.72.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-504.72.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-504.72.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-504.72.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-504.72.4.el6.x86_64", "product": { "name": "perf-0:2.6.32-504.72.4.el6.x86_64", "product_id": "perf-0:2.6.32-504.72.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-504.72.4.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-504.72.4.el6.src", "product": { "name": "kernel-0:2.6.32-504.72.4.el6.src", "product_id": "kernel-0:2.6.32-504.72.4.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-504.72.4.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-504.72.4.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-504.72.4.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:2.6.32-504.72.4.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-504.72.4.el6.noarch", "product_id": "kernel-doc-0:2.6.32-504.72.4.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-504.72.4.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.72.4.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.src" }, "product_reference": "kernel-0:2.6.32-504.72.4.el6.src", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-504.72.4.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-504.72.4.el6.noarch", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-504.72.4.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:perf-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "perf-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:python-perf-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.72.4.el6.src as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.src" }, "product_reference": "kernel-0:2.6.32-504.72.4.el6.src", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-504.72.4.el6.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-504.72.4.el6.noarch", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-504.72.4.el6.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:perf-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "perf-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:python-perf-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.72.4.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.src" }, "product_reference": "kernel-0:2.6.32-504.72.4.el6.src", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-504.72.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-504.72.4.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-504.72.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:perf-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "perf-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.72.4.el6.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.src" }, "product_reference": "kernel-0:2.6.32-504.72.4.el6.src", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-504.72.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-504.72.4.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-504.72.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:perf-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "perf-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3620", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:18:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2392" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3646", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3646", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3646" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:18:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2392" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Vegard Nossum" ], "organization": "Oracle Corporation" } ], "cve": "CVE-2018-10901", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "discovery_date": "2018-06-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601849" } ], "notes": [ { "category": "description", "text": "A flaw was found in Linux kernel\u0027s KVM virtualization subsystem. The VMX code does not restore the GDT.LIMIT to the previous host value, but instead sets it to 64KB. With a corrupted GDT limit a host\u0027s userspace code has an ability to place malicious entries in the GDT, particularly to the per-cpu variables. An attacker can use this to escalate their privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: kvm: vmx: host GDT limit corruption", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10901" }, { "category": "external", "summary": "RHBZ#1601849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601849" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10901", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10901" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10901", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10901" } ], "release_date": "2010-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:18:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2392" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.72.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.72.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.72.4.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: kvm: vmx: host GDT limit corruption" } ] }
rhsa-2018:2395
Vulnerability from csaf_redhat
Published
2018-08-14 20:23
Modified
2025-08-03 19:15
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3693)
* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)
* kernel: crypto: privilege escalation in skcipher_recvmsg function (CVE-2017-13215)
* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)
* kernel: race condition in snd_seq_write() may lead to UAF or OOB access (CVE-2018-7566)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646; Vladimir Kiriansky (MIT) and Carl Waldspurger (Carl Waldspurger Consulting) for reporting CVE-2018-3693; and Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390.
Bug Fix(es):
* The kernel-rt packages have been upgraded to the 3.10.0-862.10.2 source tree, which provides a number of bug fixes over the previous version. (BZ#1594915)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3693)\n\n* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)\n\n* kernel: crypto: privilege escalation in skcipher_recvmsg function (CVE-2017-13215)\n\n* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)\n\n* kernel: race condition in snd_seq_write() may lead to UAF or OOB access (CVE-2018-7566)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646; Vladimir Kiriansky (MIT) and Carl Waldspurger (Carl Waldspurger Consulting) for reporting CVE-2018-3693; and Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390.\n\nBug Fix(es):\n\n* The kernel-rt packages have been upgraded to the 3.10.0-862.10.2 source tree, which provides a number of bug fixes over the previous version. (BZ#1594915)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2395", "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "1535173", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535173" }, { "category": "external", "summary": "1550142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142" }, { "category": "external", "summary": "1575065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575065" }, { "category": "external", "summary": "1581650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581650" }, { "category": "external", "summary": "1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "1594915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1594915" }, { "category": "external", "summary": "1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2395.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2025-08-03T19:15:19+00:00", "generator": { "date": "2025-08-03T19:15:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2395", "initial_release_date": "2018-08-14T20:23:19+00:00", "revision_history": [ { "date": "2018-08-14T20:23:19+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-08-14T20:23:19+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T19:15:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product": { "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Realtime (v. 7)", "product": { "name": "Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-862.11.6.rt56.819.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "product": { "name": "kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "product_id": "kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-862.11.6.rt56.819.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "product": { "name": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "product_id": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-862.11.6.rt56.819.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13215", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2018-01-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1535173" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s skcipher component, which affects the skcipher_recvmsg function. Attackers using a specific input can lead to a privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: crypto: privilege escalation in skcipher_recvmsg function", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6, and kernel-alt packages.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7, MRG-2 and real-time kernels.\n\nFuture Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-13215" }, { "category": "external", "summary": "RHBZ#1535173", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535173" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-13215", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13215" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-13215", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-13215" } ], "release_date": "2018-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:23:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2395" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: crypto: privilege escalation in skcipher_recvmsg function" }, { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3620", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:23:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2395" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3646", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3646", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3646" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:23:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2395" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Carl Waldspurger" ], "organization": "Carl Waldspurger Consulting" }, { "names": [ "Vladimir Kiriansky" ], "organization": "MIT" } ], "cve": "CVE-2018-3693", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1581650" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: speculative bounds check bypass store", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3693" }, { "category": "external", "summary": "RHBZ#1581650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3693", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3693" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3693", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3693" }, { "category": "external", "summary": "https://01.org/security/advisories/intel-oss-10002", "url": "https://01.org/security/advisories/intel-oss-10002" }, { "category": "external", "summary": "https://access.redhat.com/solutions/3523601", "url": "https://access.redhat.com/solutions/3523601" }, { "category": "external", "summary": "https://people.csail.mit.edu/vlk/spectre11.pdf", "url": "https://people.csail.mit.edu/vlk/spectre11.pdf" }, { "category": "external", "summary": "https://software.intel.com/sites/default/files/managed/4e/a1/337879-analyzing-potential-bounds-Check-bypass-vulnerabilities.pdf", "url": "https://software.intel.com/sites/default/files/managed/4e/a1/337879-analyzing-potential-bounds-Check-bypass-vulnerabilities.pdf" } ], "release_date": "2018-07-10T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:23:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2395" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: speculative bounds check bypass store" }, { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5390", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601704" } ], "notes": [ { "category": "description", "text": "A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "RHBZ#1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5390", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/962459", "url": "https://www.kb.cert.org/vuls/id/962459" }, { "category": "external", "summary": "https://www.spinics.net/lists/netdev/msg514742.html", "url": "https://www.spinics.net/lists/netdev/msg514742.html" } ], "release_date": "2018-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:23:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2395" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)" }, { "cve": "CVE-2018-7566", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2018-01-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1550142" } ], "notes": [ { "category": "description", "text": "ALSA sequencer core initializes the event pool on demand by invoking snd_seq_pool_init() when the first write happens and the pool is empty. A user can reset the pool size manually via ioctl concurrently, and this may lead to UAF or out-of-bound access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "RHBZ#1550142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-7566", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7566" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566" } ], "release_date": "2018-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:23:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2395" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access" }, { "cve": "CVE-2018-10675", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2018-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1575065" } ], "notes": [ { "category": "description", "text": "The do_get_mempolicy() function in mm/mempolicy.c in the Linux kernel allows local users to hit a use-after-free bug via crafted system calls and thus cause a denial of service (DoS) or possibly have unspecified other impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10675" }, { "category": "external", "summary": "RHBZ#1575065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575065" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10675", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10675" } ], "release_date": "2017-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:23:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2395" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.11.6.rt56.819.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.11.6.rt56.819.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.11.6.rt56.819.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact" } ] }
rhsa-2018:2404
Vulnerability from csaf_redhat
Published
2018-08-15 15:25
Modified
2025-08-02 07:05
Summary
Red Hat Security Advisory: rhev-hypervisor7 security update
Notes
Topic
An update for rhev-hypervisor7 is now available for RHEV 3.X Hypervisor and Agents for Red Hat Enterprise Linux 6 and RHEV 3.X Hypervisor and Agents Extended Lifecycle Support for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The rhev-hypervisor7 package provides a Red Hat Enterprise Virtualization Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes everything necessary to run and manage virtual machines: A subset of the Red Hat Enterprise Linux operating environment and the Red Hat Enterprise Virtualization Agent.
Security Fix(es):
* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)
Red Hat would like to thank Intel OSSIRT (Intel.com) for reporting these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rhev-hypervisor7 is now available for RHEV 3.X Hypervisor and Agents for Red Hat Enterprise Linux 6 and RHEV 3.X Hypervisor and Agents Extended Lifecycle Support for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The rhev-hypervisor7 package provides a Red Hat Enterprise Virtualization Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes everything necessary to run and manage virtual machines: A subset of the Red Hat Enterprise Linux operating environment and the Red Hat Enterprise Virtualization Agent.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2404", "url": "https://access.redhat.com/errata/RHSA-2018:2404" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "1614065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1614065" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2404.json" } ], "title": "Red Hat Security Advisory: rhev-hypervisor7 security update", "tracking": { "current_release_date": "2025-08-02T07:05:51+00:00", "generator": { "date": "2025-08-02T07:05:51+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2404", "initial_release_date": "2018-08-15T15:25:12+00:00", "revision_history": [ { "date": "2018-08-15T15:25:12+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-08-15T15:25:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T07:05:51+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEV Hypervisor for RHEL-6 ELS", "product": { "name": "RHEV Hypervisor for RHEL-6 ELS", "product_id": "6Server-RHEV-Hypervisor-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::hypervisor" } } }, { "category": "product_name", "name": "RHEL 7-based RHEV-H ELS", "product": { "name": "RHEL 7-based RHEV-H ELS", "product_id": "7Server-RHEV-Hypervisor-ELS-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "rhev-hypervisor7-0:7.3-20180813.0.el6ev.src", "product": { "name": "rhev-hypervisor7-0:7.3-20180813.0.el6ev.src", "product_id": "rhev-hypervisor7-0:7.3-20180813.0.el6ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhev-hypervisor7@7.3-20180813.0.el6ev?arch=src" } } }, { "category": "product_version", "name": "rhev-hypervisor7-0:7.3-20180813.0.el7ev.src", "product": { "name": "rhev-hypervisor7-0:7.3-20180813.0.el7ev.src", "product_id": "rhev-hypervisor7-0:7.3-20180813.0.el7ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhev-hypervisor7@7.3-20180813.0.el7ev?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rhev-hypervisor7-0:7.3-20180813.0.el6ev.noarch", "product": { "name": "rhev-hypervisor7-0:7.3-20180813.0.el6ev.noarch", "product_id": "rhev-hypervisor7-0:7.3-20180813.0.el6ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhev-hypervisor7@7.3-20180813.0.el6ev?arch=noarch" } } }, { "category": "product_version", "name": "rhev-hypervisor7-0:7.3-20180813.0.el7ev.noarch", "product": { "name": "rhev-hypervisor7-0:7.3-20180813.0.el7ev.noarch", "product_id": "rhev-hypervisor7-0:7.3-20180813.0.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhev-hypervisor7@7.3-20180813.0.el7ev?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhev-hypervisor7-0:7.3-20180813.0.el6ev.noarch as a component of RHEV Hypervisor for RHEL-6 ELS", "product_id": "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180813.0.el6ev.noarch" }, "product_reference": "rhev-hypervisor7-0:7.3-20180813.0.el6ev.noarch", "relates_to_product_reference": "6Server-RHEV-Hypervisor-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "rhev-hypervisor7-0:7.3-20180813.0.el6ev.src as a component of RHEV Hypervisor for RHEL-6 ELS", "product_id": "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180813.0.el6ev.src" }, "product_reference": "rhev-hypervisor7-0:7.3-20180813.0.el6ev.src", "relates_to_product_reference": "6Server-RHEV-Hypervisor-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "rhev-hypervisor7-0:7.3-20180813.0.el7ev.noarch as a component of RHEL 7-based RHEV-H ELS", "product_id": "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180813.0.el7ev.noarch" }, "product_reference": "rhev-hypervisor7-0:7.3-20180813.0.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-Hypervisor-ELS-7" }, { "category": "default_component_of", "full_product_name": { "name": "rhev-hypervisor7-0:7.3-20180813.0.el7ev.src as a component of RHEL 7-based RHEV-H ELS", "product_id": "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180813.0.el7ev.src" }, "product_reference": "rhev-hypervisor7-0:7.3-20180813.0.el7ev.src", "relates_to_product_reference": "7Server-RHEV-Hypervisor-ELS-7" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3620", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180813.0.el6ev.noarch", "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180813.0.el6ev.src", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180813.0.el7ev.noarch", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180813.0.el7ev.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-15T15:25:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180813.0.el6ev.noarch", "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180813.0.el6ev.src", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180813.0.el7ev.noarch", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180813.0.el7ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2404" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180813.0.el6ev.noarch", "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180813.0.el6ev.src", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180813.0.el7ev.noarch", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180813.0.el7ev.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3646", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180813.0.el6ev.noarch", "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180813.0.el6ev.src", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180813.0.el7ev.noarch", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180813.0.el7ev.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3646", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3646" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-15T15:25:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180813.0.el6ev.noarch", "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180813.0.el6ev.src", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180813.0.el7ev.noarch", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180813.0.el7ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2404" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180813.0.el6ev.noarch", "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180813.0.el6ev.src", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180813.0.el7ev.noarch", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180813.0.el7ev.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" } ] }
rhsa-2018:2389
Vulnerability from csaf_redhat
Published
2018-08-14 20:33
Modified
2025-08-02 07:06
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)
Red Hat would like to thank Intel OSSIRT (Intel.com) for reporting these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2389", "url": "https://access.redhat.com/errata/RHSA-2018:2389" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2389.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-08-02T07:06:41+00:00", "generator": { "date": "2025-08-02T07:06:41+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2389", "initial_release_date": "2018-08-14T20:33:38+00:00", "revision_history": [ { "date": "2018-08-14T20:33:38+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-08-14T20:33:38+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T07:06:41+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server E4S (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server TUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.2::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.71.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.71.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.71.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.71.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.71.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-327.71.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.71.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.71.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-327.71.4.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-327.71.4.el7.x86_64", "product_id": "python-perf-0:3.10.0-327.71.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-327.71.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.71.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-327.71.4.el7.x86_64", "product": { "name": "kernel-0:3.10.0-327.71.4.el7.x86_64", "product_id": "kernel-0:3.10.0-327.71.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-327.71.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.71.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.71.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-327.71.4.el7.x86_64", "product": { "name": "perf-0:3.10.0-327.71.4.el7.x86_64", "product_id": "perf-0:3.10.0-327.71.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-327.71.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.71.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.71.4.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-327.71.4.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:3.10.0-327.71.4.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-327.71.4.el7.noarch", "product_id": "kernel-doc-0:3.10.0-327.71.4.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-327.71.4.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-327.71.4.el7.src", "product": { "name": "kernel-0:3.10.0-327.71.4.el7.src", "product_id": "kernel-0:3.10.0-327.71.4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-327.71.4.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.71.4.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.71.4.el7.src" }, "product_reference": "kernel-0:3.10.0-327.71.4.el7.src", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.71.4.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.71.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.71.4.el7.noarch", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:perf-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:python-perf-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.71.4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-0:3.10.0-327.71.4.el7.src" }, "product_reference": "kernel-0:3.10.0-327.71.4.el7.src", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.71.4.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.71.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.71.4.el7.noarch", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:perf-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:python-perf-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.71.4.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-0:3.10.0-327.71.4.el7.src" }, "product_reference": "kernel-0:3.10.0-327.71.4.el7.src", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.71.4.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.71.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.71.4.el7.noarch", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:perf-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:python-perf-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.71.4.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.71.4.el7.src" }, "product_reference": "kernel-0:3.10.0-327.71.4.el7.src", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.71.4.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.71.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.71.4.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:perf-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.71.4.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.71.4.el7.src" }, "product_reference": "kernel-0:3.10.0-327.71.4.el7.src", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.71.4.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.71.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.71.4.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:perf-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.71.4.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.71.4.el7.src" }, "product_reference": "kernel-0:3.10.0-327.71.4.el7.src", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.71.4.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.71.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.71.4.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:perf-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3620", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.71.4.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.71.4.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.71.4.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.71.4.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.71.4.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.71.4.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:33:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.71.4.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.71.4.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.71.4.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.71.4.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.71.4.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.71.4.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2389" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.71.4.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.71.4.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.71.4.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.71.4.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.71.4.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.71.4.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3646", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.71.4.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.71.4.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.71.4.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.71.4.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.71.4.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.71.4.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3646", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3646" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:33:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.71.4.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.71.4.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.71.4.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.71.4.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.71.4.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.71.4.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2389" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.71.4.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.71.4.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.71.4.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.71.4.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.71.4.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.71.4.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.71.4.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.71.4.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.71.4.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" } ] }
rhsa-2018:2403
Vulnerability from csaf_redhat
Published
2018-08-15 10:20
Modified
2025-08-02 07:05
Summary
Red Hat Security Advisory: redhat-virtualization-host security update
Notes
Topic
An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks.
Security Fix(es):
* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)
* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)
Red Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646 and Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\n* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646 and Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2403", "url": "https://access.redhat.com/errata/RHSA-2018:2403" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "1614067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1614067" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2403.json" } ], "title": "Red Hat Security Advisory: redhat-virtualization-host security update", "tracking": { "current_release_date": "2025-08-02T07:05:57+00:00", "generator": { "date": "2025-08-02T07:05:57+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2403", "initial_release_date": "2018-08-15T10:20:45+00:00", "revision_history": [ { "date": "2018-08-15T10:20:45+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-08-15T10:20:45+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T07:05:57+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product": { "name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } }, { "category": "product_name", "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7", "product": { "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "redhat-release-virtualization-host-0:4.2-5.2.el7.x86_64", "product": { "name": "redhat-release-virtualization-host-0:4.2-5.2.el7.x86_64", "product_id": "redhat-release-virtualization-host-0:4.2-5.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.2-5.2.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "redhat-release-virtualization-host-0:4.2-5.2.el7.src", "product": { "name": "redhat-release-virtualization-host-0:4.2-5.2.el7.src", "product_id": "redhat-release-virtualization-host-0:4.2-5.2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.2-5.2.el7?arch=src" } } }, { "category": "product_version", "name": "redhat-virtualization-host-0:4.2-20180813.0.el7_5.src", "product": { "name": "redhat-virtualization-host-0:4.2-20180813.0.el7_5.src", "product_id": "redhat-virtualization-host-0:4.2-20180813.0.el7_5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host@4.2-20180813.0.el7_5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "redhat-virtualization-host-image-update-placeholder-0:4.2-5.2.el7.noarch", "product": { "name": "redhat-virtualization-host-image-update-placeholder-0:4.2-5.2.el7.noarch", "product_id": "redhat-virtualization-host-image-update-placeholder-0:4.2-5.2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.2-5.2.el7?arch=noarch" } } }, { "category": "product_version", "name": "redhat-virtualization-host-image-update-0:4.2-20180813.0.el7_5.noarch", "product": { "name": "redhat-virtualization-host-image-update-0:4.2-20180813.0.el7_5.noarch", "product_id": "redhat-virtualization-host-image-update-0:4.2-20180813.0.el7_5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.2-20180813.0.el7_5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-0:4.2-20180813.0.el7_5.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180813.0.el7_5.src" }, "product_reference": "redhat-virtualization-host-0:4.2-20180813.0.el7_5.src", "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-0:4.2-20180813.0.el7_5.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180813.0.el7_5.noarch" }, "product_reference": "redhat-virtualization-host-image-update-0:4.2-20180813.0.el7_5.noarch", "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-virtualization-host-0:4.2-5.2.el7.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.src" }, "product_reference": "redhat-release-virtualization-host-0:4.2-5.2.el7.src", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-virtualization-host-0:4.2-5.2.el7.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.x86_64" }, "product_reference": "redhat-release-virtualization-host-0:4.2-5.2.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-placeholder-0:4.2-5.2.el7.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-5.2.el7.noarch" }, "product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.2-5.2.el7.noarch", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3620", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180813.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180813.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-5.2.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-15T10:20:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180813.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180813.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-5.2.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2403" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180813.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180813.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-5.2.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3646", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180813.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180813.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-5.2.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3646", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3646" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-15T10:20:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180813.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180813.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-5.2.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2403" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180813.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180813.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-5.2.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5390", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601704" } ], "notes": [ { "category": "description", "text": "A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180813.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180813.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-5.2.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "RHBZ#1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5390", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/962459", "url": "https://www.kb.cert.org/vuls/id/962459" }, { "category": "external", "summary": "https://www.spinics.net/lists/netdev/msg514742.html", "url": "https://www.spinics.net/lists/netdev/msg514742.html" } ], "release_date": "2018-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-15T10:20:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180813.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180813.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-5.2.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2403" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180813.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180813.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-5.2.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-5.2.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)" } ] }
rhsa-2018:2390
Vulnerability from csaf_redhat
Published
2018-08-14 18:31
Modified
2025-08-03 22:19
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[Updated 16th August 2018]
The original errata text was missing reference to CVE-2018-5390 fix. We have updated the errata text to correct this issue. No changes have been made to the packages.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3693)
* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)
* kernel: kvm: vmx: host GDT limit corruption (CVE-2018-10901)
* kernel: Use-after-free in snd_pcm_info function in ALSA subsystem potentially leads to privilege escalation (CVE-2017-0861)
* kernel: Use-after-free in snd_seq_ioctl_create_port() (CVE-2017-15265)
* kernel: race condition in snd_seq_write() may lead to UAF or OOB-access (CVE-2018-7566)
* kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646; Vladimir Kiriansky (MIT) and Carl Waldspurger (Carl Waldspurger Consulting) for reporting CVE-2018-3693; Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390; and Vegard Nossum (Oracle Corporation) for reporting CVE-2018-10901.
Bug Fix(es):
* The Least recently used (LRU) operations are batched by caching pages in per-cpu page vectors to prevent contention of the heavily used lru_lock spinlock. The page vectors can hold even the compound pages. Previously, the page vectors were cleared only if they were full. Subsequently, the amount of memory held in page vectors, which is not reclaimable, was sometimes too high. Consequently the page reclamation started the Out of Memory (OOM) killing processes. With this update, the underlying source code has been fixed to clear LRU page vectors each time when a compound page is added to them. As a result, OOM killing processes due to high amounts of memory held in page vectors no longer occur. (BZ#1575819)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\n[Updated 16th August 2018]\nThe original errata text was missing reference to CVE-2018-5390 fix. We have updated the errata text to correct this issue. No changes have been made to the packages.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3693)\n\n* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)\n\n* kernel: kvm: vmx: host GDT limit corruption (CVE-2018-10901)\n\n* kernel: Use-after-free in snd_pcm_info function in ALSA subsystem potentially leads to privilege escalation (CVE-2017-0861)\n\n* kernel: Use-after-free in snd_seq_ioctl_create_port() (CVE-2017-15265)\n\n* kernel: race condition in snd_seq_write() may lead to UAF or OOB-access (CVE-2018-7566)\n\n* kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646; Vladimir Kiriansky (MIT) and Carl Waldspurger (Carl Waldspurger Consulting) for reporting CVE-2018-3693; Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390; and Vegard Nossum (Oracle Corporation) for reporting CVE-2018-10901.\n\nBug Fix(es):\n\n* The Least recently used (LRU) operations are batched by caching pages in per-cpu page vectors to prevent contention of the heavily used lru_lock spinlock. The page vectors can hold even the compound pages. Previously, the page vectors were cleared only if they were full. Subsequently, the amount of memory held in page vectors, which is not reclaimable, was sometimes too high. Consequently the page reclamation started the Out of Memory (OOM) killing processes. With this update, the underlying source code has been fixed to clear LRU page vectors each time when a compound page is added to them. As a result, OOM killing processes due to high amounts of memory held in page vectors no longer occur. (BZ#1575819)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2390", "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "1501878", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501878" }, { "category": "external", "summary": "1535315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535315" }, { "category": "external", "summary": "1550142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142" }, { "category": "external", "summary": "1563994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563994" }, { "category": "external", "summary": "1581650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581650" }, { "category": "external", "summary": "1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "1601849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601849" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2390.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-03T22:19:17+00:00", "generator": { "date": "2025-08-03T22:19:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2390", "initial_release_date": "2018-08-14T18:31:23+00:00", "revision_history": [ { "date": "2018-08-14T18:31:23+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-08-16T09:52:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T22:19:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.3.5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "perf-0:2.6.32-754.3.5.el6.x86_64", "product_id": "perf-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-754.3.5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.3.5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-754.3.5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.3.5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.3.5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.3.5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.3.5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.3.5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "kernel-0:2.6.32-754.3.5.el6.x86_64", "product_id": "kernel-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-754.3.5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.3.5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-754.3.5.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-754.3.5.el6.x86_64", "product_id": "python-perf-0:2.6.32-754.3.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.3.5.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "product": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "product_id": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.3.5.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "product": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "product_id": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.3.5.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "product": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "product_id": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.3.5.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "product": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "product_id": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-754.3.5.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "product": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "product_id": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.3.5.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "product_id": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.3.5.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-0:2.6.32-754.3.5.el6.i686", "product": { "name": "perf-0:2.6.32-754.3.5.el6.i686", "product_id": "perf-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-754.3.5.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-754.3.5.el6.i686", "product": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.i686", "product_id": "kernel-devel-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.3.5.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-754.3.5.el6.i686", "product": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.i686", "product_id": "kernel-headers-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.3.5.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-754.3.5.el6.i686", "product": { "name": "kernel-0:2.6.32-754.3.5.el6.i686", "product_id": "kernel-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-754.3.5.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-754.3.5.el6.i686", "product": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.i686", "product_id": "kernel-debug-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.3.5.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-754.3.5.el6.i686", "product": { "name": "python-perf-0:2.6.32-754.3.5.el6.i686", "product_id": "python-perf-0:2.6.32-754.3.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.3.5.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-754.3.5.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:2.6.32-754.3.5.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-754.3.5.el6.noarch", "product_id": "kernel-doc-0:2.6.32-754.3.5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-754.3.5.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-754.3.5.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-754.3.5.el6.src", "product": { "name": "kernel-0:2.6.32-754.3.5.el6.src", "product_id": "kernel-0:2.6.32-754.3.5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-754.3.5.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "product_id": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product_id": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "python-perf-0:2.6.32-754.3.5.el6.s390x", "product_id": "python-perf-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product_id": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product_id": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "perf-0:2.6.32-754.3.5.el6.s390x", "product_id": "perf-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "product_id": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "product_id": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.s390x", "product_id": "kernel-devel-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "product_id": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.s390x", "product_id": "kernel-headers-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "kernel-0:2.6.32-754.3.5.el6.s390x", "product_id": "kernel-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-754.3.5.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-754.3.5.el6.s390x", "product": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.s390x", "product_id": "kernel-debug-0:2.6.32-754.3.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.3.5.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product_id": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "python-perf-0:2.6.32-754.3.5.el6.ppc64", "product_id": "python-perf-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product_id": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product_id": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "perf-0:2.6.32-754.3.5.el6.ppc64", "product_id": "perf-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "product_id": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "product_id": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "product_id": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "product_id": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "kernel-0:2.6.32-754.3.5.el6.ppc64", "product_id": "kernel-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-754.3.5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "product": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "product_id": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.3.5.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.src", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.src", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.src", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.src", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.src", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.src", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.src", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.src", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-0861", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2017-11-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1563994" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in the snd_pcm_info() function in the ALSA subsystem in the Linux kernel allows attackers to induce a kernel memory corruption and possibly crash or lock up a system. Due to the nature of the flaw, a privilege escalation cannot be fully ruled out, although we believe it is unlikely.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use-after-free in snd_pcm_info function in ALSA subsystem potentially leads to privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-0861" }, { "category": "external", "summary": "RHBZ#1563994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563994" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-0861", "url": "https://www.cve.org/CVERecord?id=CVE-2017-0861" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-0861", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-0861" } ], "release_date": "2017-12-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:31:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Use-after-free in snd_pcm_info function in ALSA subsystem potentially leads to privilege escalation" }, { "cve": "CVE-2017-15265", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2017-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1501878" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found when issuing an ioctl to a sound device. This could allow a user to exploit a race condition and create memory corruption or possibly privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use-after-free in snd_seq_ioctl_create_port()", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat\nEnterprise Linux 5,6, 7, realtime and MRG-2.\n\nRed Hat Enterprise Linux 5 has transitioned to Production phase 3. \nDuring the Production 3 Phase, Critical impact Security Advisories (RHSAs) \nand selected Urgent Priority Bug Fix Advisories (RHBAs) may be released \nas they become available.\n\nThe official life cycle policy can be reviewed here:\n\nhttp://redhat.com/rhel/lifecycle\n\nFuture Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-15265" }, { "category": "external", "summary": "RHBZ#1501878", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501878" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-15265", "url": "https://www.cve.org/CVERecord?id=CVE-2017-15265" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15265", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15265" } ], "release_date": "2017-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:31:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "category": "workaround", "details": "It is possible to prevent the affected code from being loaded by blacklisting the kernel module snd_seq. Instructions relating to how to blacklist a kernel module are shown here: https://access.redhat.com/solutions/41278 \n\nAlternatively a custom permission set can be created by udev, the correct permissions will depend on your use case. Please contact Red Hat customer support for creating a rule set that can minimize flaw exposure.", "product_ids": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Use-after-free in snd_seq_ioctl_create_port()" }, { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3620", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:31:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3646", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3646", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3646" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:31:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Carl Waldspurger" ], "organization": "Carl Waldspurger Consulting" }, { "names": [ "Vladimir Kiriansky" ], "organization": "MIT" } ], "cve": "CVE-2018-3693", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1581650" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: speculative bounds check bypass store", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3693" }, { "category": "external", "summary": "RHBZ#1581650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3693", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3693" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3693", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3693" }, { "category": "external", "summary": "https://01.org/security/advisories/intel-oss-10002", "url": "https://01.org/security/advisories/intel-oss-10002" }, { "category": "external", "summary": "https://access.redhat.com/solutions/3523601", "url": "https://access.redhat.com/solutions/3523601" }, { "category": "external", "summary": "https://people.csail.mit.edu/vlk/spectre11.pdf", "url": "https://people.csail.mit.edu/vlk/spectre11.pdf" }, { "category": "external", "summary": "https://software.intel.com/sites/default/files/managed/4e/a1/337879-analyzing-potential-bounds-Check-bypass-vulnerabilities.pdf", "url": "https://software.intel.com/sites/default/files/managed/4e/a1/337879-analyzing-potential-bounds-Check-bypass-vulnerabilities.pdf" } ], "release_date": "2018-07-10T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:31:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: speculative bounds check bypass store" }, { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5390", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601704" } ], "notes": [ { "category": "description", "text": "A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "RHBZ#1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5390", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/962459", "url": "https://www.kb.cert.org/vuls/id/962459" }, { "category": "external", "summary": "https://www.spinics.net/lists/netdev/msg514742.html", "url": "https://www.spinics.net/lists/netdev/msg514742.html" } ], "release_date": "2018-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:31:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)" }, { "cve": "CVE-2018-7566", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2018-01-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1550142" } ], "notes": [ { "category": "description", "text": "ALSA sequencer core initializes the event pool on demand by invoking snd_seq_pool_init() when the first write happens and the pool is empty. A user can reset the pool size manually via ioctl concurrently, and this may lead to UAF or out-of-bound access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "RHBZ#1550142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-7566", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7566" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566" } ], "release_date": "2018-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:31:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access" }, { "acknowledgments": [ { "names": [ "Vegard Nossum" ], "organization": "Oracle Corporation" } ], "cve": "CVE-2018-10901", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "discovery_date": "2018-06-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601849" } ], "notes": [ { "category": "description", "text": "A flaw was found in Linux kernel\u0027s KVM virtualization subsystem. The VMX code does not restore the GDT.LIMIT to the previous host value, but instead sets it to 64KB. With a corrupted GDT limit a host\u0027s userspace code has an ability to place malicious entries in the GDT, particularly to the per-cpu variables. An attacker can use this to escalate their privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: kvm: vmx: host GDT limit corruption", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10901" }, { "category": "external", "summary": "RHBZ#1601849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601849" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10901", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10901" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10901", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10901" } ], "release_date": "2010-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:31:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: kvm: vmx: host GDT limit corruption" }, { "cve": "CVE-2018-1000004", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2018-01-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1535315" } ], "notes": [ { "category": "description", "text": "In the Linux kernel versions 4.12, 3.10, 2.6, and possibly earlier, a race condition vulnerability exists in the sound system allowing for a potential deadlock and memory corruption due to use-after-free condition and thus denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Race condition in sound system can lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of Linux kernel package as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "RHBZ#1535315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535315" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000004", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000004", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000004" } ], "release_date": "2018-01-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:31:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Client-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Server-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.src", "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.3.5.el6.noarch", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.3.5.el6.x86_64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.i686", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.ppc64", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.s390x", "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.3.5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Race condition in sound system can lead to denial of service" } ] }
rhsa-2018:2603
Vulnerability from csaf_redhat
Published
2018-08-29 18:30
Modified
2025-08-02 07:06
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 5.9 Long Life.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)
Red Hat would like to thank Intel OSSIRT (Intel.com) for reporting these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 5.9 Long Life.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2603", "url": "https://access.redhat.com/errata/RHSA-2018:2603" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2603.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-08-02T07:06:58+00:00", "generator": { "date": "2025-08-02T07:06:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2603", "initial_release_date": "2018-08-29T18:30:04+00:00", "revision_history": [ { "date": "2018-08-29T18:30:04+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-08-29T18:30:04+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T07:06:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product": { "name": "Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:5.9" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-348.41.1.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-348.41.1.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-348.41.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-348.41.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-348.41.1.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-348.41.1.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-348.41.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-348.41.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-348.41.1.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-348.41.1.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-348.41.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-348.41.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-348.41.1.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-348.41.1.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-348.41.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-348.41.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-348.41.1.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-348.41.1.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-348.41.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-348.41.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-348.41.1.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-348.41.1.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-348.41.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-348.41.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-348.41.1.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-348.41.1.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-348.41.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-348.41.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-348.41.1.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-348.41.1.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-348.41.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-348.41.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-348.41.1.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-348.41.1.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-348.41.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-348.41.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-348.41.1.el5.x86_64", "product": { "name": "kernel-0:2.6.18-348.41.1.el5.x86_64", "product_id": "kernel-0:2.6.18-348.41.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-348.41.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-348.41.1.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-348.41.1.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-348.41.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-348.41.1.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-348.41.1.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-348.41.1.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-348.41.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-348.41.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-348.41.1.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-348.41.1.el5.i686", "product_id": "kernel-devel-0:2.6.18-348.41.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-348.41.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-348.41.1.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-348.41.1.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-348.41.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-348.41.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-348.41.1.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-348.41.1.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-348.41.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-348.41.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-348.41.1.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-348.41.1.el5.i686", "product_id": "kernel-debug-0:2.6.18-348.41.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-348.41.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-348.41.1.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-348.41.1.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-348.41.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-348.41.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-348.41.1.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-348.41.1.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-348.41.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-348.41.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-348.41.1.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-348.41.1.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-348.41.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-348.41.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-348.41.1.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-348.41.1.el5.i686", "product_id": "kernel-PAE-0:2.6.18-348.41.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-348.41.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-348.41.1.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-348.41.1.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-348.41.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-348.41.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-348.41.1.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-348.41.1.el5.i686", "product_id": "kernel-xen-0:2.6.18-348.41.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-348.41.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-348.41.1.el5.i686", "product": { "name": "kernel-0:2.6.18-348.41.1.el5.i686", "product_id": "kernel-0:2.6.18-348.41.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-348.41.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-348.41.1.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-348.41.1.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-348.41.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-348.41.1.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-348.41.1.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-348.41.1.el5.i386", "product_id": "kernel-headers-0:2.6.18-348.41.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-348.41.1.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-348.41.1.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-348.41.1.el5.noarch", "product_id": "kernel-doc-0:2.6.18-348.41.1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-348.41.1.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-348.41.1.el5.src", "product": { "name": "kernel-0:2.6.18-348.41.1.el5.src", "product_id": "kernel-0:2.6.18-348.41.1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-348.41.1.el5?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-348.41.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-0:2.6.18-348.41.1.el5.i686" }, "product_reference": "kernel-0:2.6.18-348.41.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-348.41.1.el5.src as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-0:2.6.18-348.41.1.el5.src" }, "product_reference": "kernel-0:2.6.18-348.41.1.el5.src", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-348.41.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-0:2.6.18-348.41.1.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-348.41.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-348.41.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.41.1.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-348.41.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-348.41.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.41.1.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-348.41.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-348.41.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.41.1.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-348.41.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-348.41.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.41.1.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-348.41.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-348.41.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.41.1.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-348.41.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-348.41.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.41.1.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-348.41.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-348.41.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.41.1.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-348.41.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-348.41.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.41.1.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-348.41.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-348.41.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.41.1.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-348.41.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-348.41.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.41.1.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-348.41.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-348.41.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.41.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-348.41.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-348.41.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.41.1.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-348.41.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-348.41.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.41.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-348.41.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-348.41.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.41.1.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-348.41.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-348.41.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.41.1.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-348.41.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-348.41.1.el5.noarch as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-doc-0:2.6.18-348.41.1.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-348.41.1.el5.noarch", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-348.41.1.el5.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.41.1.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-348.41.1.el5.i386", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-348.41.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.41.1.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-348.41.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-348.41.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.41.1.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-348.41.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-348.41.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.41.1.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-348.41.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-348.41.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.41.1.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-348.41.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-348.41.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.41.1.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-348.41.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-348.41.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.41.1.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-348.41.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-348.41.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.41.1.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-348.41.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3620", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.AUS:kernel-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-0:2.6.18-348.41.1.el5.src", "5Server-5.9.AUS:kernel-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-doc-0:2.6.18-348.41.1.el5.noarch", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.41.1.el5.i386", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.41.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-29T18:30:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "5Server-5.9.AUS:kernel-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-0:2.6.18-348.41.1.el5.src", "5Server-5.9.AUS:kernel-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-doc-0:2.6.18-348.41.1.el5.noarch", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.41.1.el5.i386", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.41.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2603" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "5Server-5.9.AUS:kernel-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-0:2.6.18-348.41.1.el5.src", "5Server-5.9.AUS:kernel-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-doc-0:2.6.18-348.41.1.el5.noarch", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.41.1.el5.i386", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.41.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3646", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.AUS:kernel-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-0:2.6.18-348.41.1.el5.src", "5Server-5.9.AUS:kernel-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-doc-0:2.6.18-348.41.1.el5.noarch", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.41.1.el5.i386", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.41.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3646", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3646" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-29T18:30:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "5Server-5.9.AUS:kernel-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-0:2.6.18-348.41.1.el5.src", "5Server-5.9.AUS:kernel-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-doc-0:2.6.18-348.41.1.el5.noarch", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.41.1.el5.i386", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.41.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2603" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "5Server-5.9.AUS:kernel-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-0:2.6.18-348.41.1.el5.src", "5Server-5.9.AUS:kernel-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-doc-0:2.6.18-348.41.1.el5.noarch", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.41.1.el5.i386", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.41.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.41.1.el5.i686", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.41.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" } ] }
rhsa-2018:2384
Vulnerability from csaf_redhat
Published
2018-08-14 18:49
Modified
2025-08-03 19:14
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3693)
* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)
* kernel: crypto: privilege escalation in skcipher_recvmsg function (CVE-2017-13215)
* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)
* kernel: race condition in snd_seq_write() may lead to UAF or OOB access (CVE-2018-7566)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646; Vladimir Kiriansky (MIT) and Carl Waldspurger (Carl Waldspurger Consulting) for reporting CVE-2018-3693; and Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390.
Bug Fix(es):
These updated kernel packages include also numerous bug fixes. Space precludes documenting all of the bug fixes in this advisory. See the descriptions in the related Knowledge Article:
https://access.redhat.com/articles/3527791
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3693)\n\n* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)\n\n* kernel: crypto: privilege escalation in skcipher_recvmsg function (CVE-2017-13215)\n\n* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)\n\n* kernel: race condition in snd_seq_write() may lead to UAF or OOB access (CVE-2018-7566)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646; Vladimir Kiriansky (MIT) and Carl Waldspurger (Carl Waldspurger Consulting) for reporting CVE-2018-3693; and Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390.\n\nBug Fix(es):\n\nThese updated kernel packages include also numerous bug fixes. Space precludes documenting all of the bug fixes in this advisory. See the descriptions in the related Knowledge Article:\n\nhttps://access.redhat.com/articles/3527791", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2384", "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://access.redhat.com/articles/3527791", "url": "https://access.redhat.com/articles/3527791" }, { "category": "external", "summary": "1535173", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535173" }, { "category": "external", "summary": "1550142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142" }, { "category": "external", "summary": "1575065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575065" }, { "category": "external", "summary": "1581650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581650" }, { "category": "external", "summary": "1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2384.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-03T19:14:27+00:00", "generator": { "date": "2025-08-03T19:14:27+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2384", "initial_release_date": "2018-08-14T18:49:36+00:00", "revision_history": [ { "date": "2018-08-14T18:49:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-08-14T18:49:36+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T19:14:27+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "product_id": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "perf-0:3.10.0-862.11.6.el7.x86_64", "product_id": "perf-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.11.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.11.6.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-862.11.6.el7.src", "product": { "name": "kernel-0:3.10.0-862.11.6.el7.src", "product_id": "kernel-0:3.10.0-862.11.6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-862.11.6.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-862.11.6.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "product_id": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-862.11.6.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64", "product_id": "perf-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product_id": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "product_id": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product_id": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-862.11.6.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "product_id": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.11.6.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "perf-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.11.6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.11.6.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "product_id": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "product_id": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "product_id": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "perf-0:3.10.0-862.11.6.el7.s390x", "product_id": "perf-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product_id": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product_id": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "python-perf-0:3.10.0-862.11.6.el7.s390x", "product_id": "python-perf-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product_id": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product_id": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "product_id": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "product_id": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "kernel-0:3.10.0-862.11.6.el7.s390x", "product_id": "kernel-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "product_id": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-862.11.6.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product_id": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.11.6.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.src", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.src", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.src", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.src", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.src", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.src", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.src", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.src", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.src", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.11.6.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.11.6.el7.noarch", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13215", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2018-01-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1535173" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s skcipher component, which affects the skcipher_recvmsg function. Attackers using a specific input can lead to a privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: crypto: privilege escalation in skcipher_recvmsg function", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6, and kernel-alt packages.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7, MRG-2 and real-time kernels.\n\nFuture Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-13215" }, { "category": "external", "summary": "RHBZ#1535173", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535173" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-13215", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13215" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-13215", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-13215" } ], "release_date": "2018-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:49:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2384" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: crypto: privilege escalation in skcipher_recvmsg function" }, { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3620", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:49:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2384" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3646", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3646", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3646" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:49:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2384" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Carl Waldspurger" ], "organization": "Carl Waldspurger Consulting" }, { "names": [ "Vladimir Kiriansky" ], "organization": "MIT" } ], "cve": "CVE-2018-3693", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1581650" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: speculative bounds check bypass store", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3693" }, { "category": "external", "summary": "RHBZ#1581650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3693", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3693" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3693", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3693" }, { "category": "external", "summary": "https://01.org/security/advisories/intel-oss-10002", "url": "https://01.org/security/advisories/intel-oss-10002" }, { "category": "external", "summary": "https://access.redhat.com/solutions/3523601", "url": "https://access.redhat.com/solutions/3523601" }, { "category": "external", "summary": "https://people.csail.mit.edu/vlk/spectre11.pdf", "url": "https://people.csail.mit.edu/vlk/spectre11.pdf" }, { "category": "external", "summary": "https://software.intel.com/sites/default/files/managed/4e/a1/337879-analyzing-potential-bounds-Check-bypass-vulnerabilities.pdf", "url": "https://software.intel.com/sites/default/files/managed/4e/a1/337879-analyzing-potential-bounds-Check-bypass-vulnerabilities.pdf" } ], "release_date": "2018-07-10T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:49:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2384" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: speculative bounds check bypass store" }, { "acknowledgments": [ { "names": [ "Juha-Matti Tilli" ], "organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs" } ], "cve": "CVE-2018-5390", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1601704" } ], "notes": [ { "category": "description", "text": "A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "RHBZ#1601704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5390", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390" }, { "category": "external", "summary": "https://access.redhat.com/articles/3553061", "url": "https://access.redhat.com/articles/3553061" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/962459", "url": "https://www.kb.cert.org/vuls/id/962459" }, { "category": "external", "summary": "https://www.spinics.net/lists/netdev/msg514742.html", "url": "https://www.spinics.net/lists/netdev/msg514742.html" } ], "release_date": "2018-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:49:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2384" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)" }, { "cve": "CVE-2018-7566", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2018-01-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1550142" } ], "notes": [ { "category": "description", "text": "ALSA sequencer core initializes the event pool on demand by invoking snd_seq_pool_init() when the first write happens and the pool is empty. A user can reset the pool size manually via ioctl concurrently, and this may lead to UAF or out-of-bound access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "RHBZ#1550142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-7566", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7566" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566" } ], "release_date": "2018-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:49:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2384" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access" }, { "cve": "CVE-2018-10675", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2018-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1575065" } ], "notes": [ { "category": "description", "text": "The do_get_mempolicy() function in mm/mempolicy.c in the Linux kernel allows local users to hit a use-after-free bug via crafted system calls and thus cause a denial of service (DoS) or possibly have unspecified other impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-10675" }, { "category": "external", "summary": "RHBZ#1575065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575065" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10675", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10675" } ], "release_date": "2017-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T18:49:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2384" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.11.6.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.11.6.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.11.6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact" } ] }
rhsa-2018:2388
Vulnerability from csaf_redhat
Published
2018-08-14 20:10
Modified
2025-08-02 07:06
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.3 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)
Red Hat would like to thank Intel OSSIRT (Intel.com) for reporting these issues.
Bug Fix(es):
* Due to a bug in a CPU's speculative execution engine, the CPU could previously leak data from other processes on the system, including passwords, encryption keys, or other sensitive information. With this update, the kernel build requirements have been updated to the GNU Compiler Collection (GCC) compiler version that has the support for Expoline for IBM z Systems. As a result, data leak no longer occurs under the described circumstances. (BZ#1577761)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.3 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting these issues.\n\nBug Fix(es):\n\n* Due to a bug in a CPU\u0027s speculative execution engine, the CPU could previously leak data from other processes on the system, including passwords, encryption keys, or other sensitive information. With this update, the kernel build requirements have been updated to the GNU Compiler Collection (GCC) compiler version that has the support for Expoline for IBM z Systems. As a result, data leak no longer occurs under the described circumstances. (BZ#1577761)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2388", "url": "https://access.redhat.com/errata/RHSA-2018:2388" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2388.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-02T07:06:35+00:00", "generator": { "date": "2025-08-02T07:06:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2388", "initial_release_date": "2018-08-14T20:10:15+00:00", "revision_history": [ { "date": "2018-08-14T20:10:15+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-08-14T20:10:15+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T07:06:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.3::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.3::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:3.10.0-514.55.4.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-514.55.4.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-514.55.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.55.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.55.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.55.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.55.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-514.55.4.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-514.55.4.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-514.55.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.55.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-514.55.4.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-514.55.4.el7.x86_64", "product_id": "python-perf-0:3.10.0-514.55.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.55.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-514.55.4.el7.x86_64", "product": { "name": "kernel-0:3.10.0-514.55.4.el7.x86_64", "product_id": "kernel-0:3.10.0-514.55.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.55.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-514.55.4.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-514.55.4.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-514.55.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.55.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-514.55.4.el7.x86_64", "product": { "name": "perf-0:3.10.0-514.55.4.el7.x86_64", "product_id": "perf-0:3.10.0-514.55.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-514.55.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.55.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.55.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.55.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-514.55.4.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-514.55.4.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-514.55.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.55.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.55.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.55.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.55.4.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-514.55.4.el7.src", "product": { "name": "kernel-0:3.10.0-514.55.4.el7.src", "product_id": "kernel-0:3.10.0-514.55.4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.55.4.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:3.10.0-514.55.4.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-514.55.4.el7.noarch", "product_id": "kernel-doc-0:3.10.0-514.55.4.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.55.4.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.55.4.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "product_id": "kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.55.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "product": { "name": "kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "product_id": "kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.55.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "product": { "name": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "product_id": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.55.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "product_id": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.55.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "product": { "name": "perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "product_id": "perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.55.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64", "product_id": "kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.55.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-514.55.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-514.55.4.el7.ppc64", "product": { "name": "perf-0:3.10.0-514.55.4.el7.ppc64", "product_id": "perf-0:3.10.0-514.55.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-514.55.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64", "product": { "name": "kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64", "product_id": "kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-514.55.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-514.55.4.el7.ppc64", "product": { "name": "kernel-debug-0:3.10.0-514.55.4.el7.ppc64", "product_id": "kernel-debug-0:3.10.0-514.55.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.55.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-514.55.4.el7.ppc64", "product": { "name": "kernel-devel-0:3.10.0-514.55.4.el7.ppc64", "product_id": "kernel-devel-0:3.10.0-514.55.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.55.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-514.55.4.el7.ppc64", "product": { "name": "kernel-headers-0:3.10.0-514.55.4.el7.ppc64", "product_id": "kernel-headers-0:3.10.0-514.55.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.55.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-514.55.4.el7.ppc64", "product": { "name": "python-perf-0:3.10.0-514.55.4.el7.ppc64", "product_id": "python-perf-0:3.10.0-514.55.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.55.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-514.55.4.el7.ppc64", "product": { "name": "kernel-tools-0:3.10.0-514.55.4.el7.ppc64", "product_id": "kernel-tools-0:3.10.0-514.55.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.55.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64", "product": { "name": "kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64", "product_id": "kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.55.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64", "product": { "name": "kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64", "product_id": "kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.55.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-514.55.4.el7.ppc64", "product": { "name": "kernel-0:3.10.0-514.55.4.el7.ppc64", "product_id": "kernel-0:3.10.0-514.55.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.55.4.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.55.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.55.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.55.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.55.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.55.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.55.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.55.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-514.55.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-514.55.4.el7.ppc64le", "product": { "name": "perf-0:3.10.0-514.55.4.el7.ppc64le", "product_id": "perf-0:3.10.0-514.55.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-514.55.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-514.55.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-514.55.4.el7.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-514.55.4.el7.ppc64le", "product_id": "kernel-debug-0:3.10.0-514.55.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.55.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-514.55.4.el7.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-514.55.4.el7.ppc64le", "product_id": "kernel-devel-0:3.10.0-514.55.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.55.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-514.55.4.el7.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-514.55.4.el7.ppc64le", "product_id": "kernel-headers-0:3.10.0-514.55.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.55.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-514.55.4.el7.ppc64le", "product": { "name": "python-perf-0:3.10.0-514.55.4.el7.ppc64le", "product_id": "python-perf-0:3.10.0-514.55.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.55.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-514.55.4.el7.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-514.55.4.el7.ppc64le", "product_id": "kernel-tools-0:3.10.0-514.55.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.55.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.55.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-514.55.4.el7.ppc64le", "product": { "name": "kernel-0:3.10.0-514.55.4.el7.ppc64le", "product_id": "kernel-0:3.10.0-514.55.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.55.4.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-kdump-0:3.10.0-514.55.4.el7.s390x", "product": { "name": "kernel-kdump-0:3.10.0-514.55.4.el7.s390x", "product_id": "kernel-kdump-0:3.10.0-514.55.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-514.55.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:3.10.0-514.55.4.el7.s390x", "product": { "name": "perf-0:3.10.0-514.55.4.el7.s390x", "product_id": "perf-0:3.10.0-514.55.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-514.55.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x", "product": { "name": "kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x", "product_id": "kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-514.55.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "product": { "name": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "product_id": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.55.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-514.55.4.el7.s390x", "product": { "name": "kernel-debug-0:3.10.0-514.55.4.el7.s390x", "product_id": "kernel-debug-0:3.10.0-514.55.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.55.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-514.55.4.el7.s390x", "product": { "name": "kernel-devel-0:3.10.0-514.55.4.el7.s390x", "product_id": "kernel-devel-0:3.10.0-514.55.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.55.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x", "product_id": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.55.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-514.55.4.el7.s390x", "product": { "name": "kernel-headers-0:3.10.0-514.55.4.el7.s390x", "product_id": "kernel-headers-0:3.10.0-514.55.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.55.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-514.55.4.el7.s390x", "product": { "name": "python-perf-0:3.10.0-514.55.4.el7.s390x", "product_id": "python-perf-0:3.10.0-514.55.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.55.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x", "product": { "name": "kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x", "product_id": "kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.55.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x", "product": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x", "product_id": "kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-514.55.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x", "product": { "name": "kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x", "product_id": "kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.55.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-514.55.4.el7.s390x", "product": { "name": "kernel-0:3.10.0-514.55.4.el7.s390x", "product_id": "kernel-0:3.10.0-514.55.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.55.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x", "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-514.55.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "product": { "name": "perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "product_id": "perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.55.4.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.55.4.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.src" }, "product_reference": "kernel-0:3.10.0-514.55.4.el7.src", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.55.4.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.55.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.55.4.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.55.4.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.src" }, "product_reference": "kernel-0:3.10.0-514.55.4.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.55.4.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.55.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.55.4.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.55.4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.src" }, "product_reference": "kernel-0:3.10.0-514.55.4.el7.src", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.55.4.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.55.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.55.4.el7.noarch", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.55.4.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.src" }, "product_reference": "kernel-0:3.10.0-514.55.4.el7.src", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.55.4.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.55.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.55.4.el7.noarch", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3620", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.55.4.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.55.4.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.55.4.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.55.4.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:10:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.55.4.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.55.4.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.55.4.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.55.4.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2388" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.55.4.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.55.4.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.55.4.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.55.4.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3646", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.55.4.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.55.4.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.55.4.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.55.4.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3646", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3646" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:10:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.55.4.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.55.4.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.55.4.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.55.4.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2388" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.55.4.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.55.4.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.55.4.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.55.4.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.55.4.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.55.4.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.55.4.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" } ] }
rhsa-2018:2387
Vulnerability from csaf_redhat
Published
2018-08-14 20:53
Modified
2025-08-02 07:06
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)
Red Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646 and Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting CVE-2018-3639.
Bug Fix(es):
* Previously, configurations with the little-endian variant of IBM Power Systems CPU architectures and Hard Disk Drives (HDD) designed according to Nonvolatile Memory Express (NVMe) open standards, experienced crashes during shutdown or reboot due to race conditions of CPUs. As a consequence, the sysfs pseudo file system threw a stack trace report about an attempt to create a duplicate entry in sysfs. This update modifies the source code so that the irq_dispose_mapping() function is called first and the msi_bitmap_free_hwirqs() function is called afterwards. As a result, the race condition no longer appears in the described scenario. (BZ#1570510)
* When switching from the indirect branch speculation (IBRS) feature to the retpolines feature, the IBRS state of some CPUs was sometimes not handled correctly. Consequently, some CPUs were left with the IBRS Model-Specific Register (MSR) bit set to 1, which could lead to performance issues. With this update, the underlying source code has been fixed to clear the IBRS MSR bits correctly, thus fixing the bug. (BZ#1586147)
* During a balloon reset, page pointers were not correctly initialized after unmapping the memory. Consequently, on the VMware ESXi hypervisor with "Fault Tolerance" and "ballooning" enabled, the following messages repeatedly occurred in the kernel log:
[3014611.640148] WARNING: at mm/vmalloc.c:1491 __vunmap+0xd3/0x100()
[3014611.640269] Trying to vfree() nonexistent vm area (ffffc90000697000)
With this update, the underlying source code has been fixed to initialize page pointers properly. As a result, the mm/vmalloc.c warnings no longer occur under the described circumstances. (BZ#1595600)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646 and Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting CVE-2018-3639.\n\nBug Fix(es):\n\n* Previously, configurations with the little-endian variant of IBM Power Systems CPU architectures and Hard Disk Drives (HDD) designed according to Nonvolatile Memory Express (NVMe) open standards, experienced crashes during shutdown or reboot due to race conditions of CPUs. As a consequence, the sysfs pseudo file system threw a stack trace report about an attempt to create a duplicate entry in sysfs. This update modifies the source code so that the irq_dispose_mapping() function is called first and the msi_bitmap_free_hwirqs() function is called afterwards. As a result, the race condition no longer appears in the described scenario. (BZ#1570510)\n\n* When switching from the indirect branch speculation (IBRS) feature to the retpolines feature, the IBRS state of some CPUs was sometimes not handled correctly. Consequently, some CPUs were left with the IBRS Model-Specific Register (MSR) bit set to 1, which could lead to performance issues. With this update, the underlying source code has been fixed to clear the IBRS MSR bits correctly, thus fixing the bug. (BZ#1586147)\n\n* During a balloon reset, page pointers were not correctly initialized after unmapping the memory. Consequently, on the VMware ESXi hypervisor with \"Fault Tolerance\" and \"ballooning\" enabled, the following messages repeatedly occurred in the kernel log:\n\n[3014611.640148] WARNING: at mm/vmalloc.c:1491 __vunmap+0xd3/0x100()\n[3014611.640269] Trying to vfree() nonexistent vm area (ffffc90000697000)\n\nWith this update, the underlying source code has been fixed to initialize page pointers properly. As a result, the mm/vmalloc.c warnings no longer occur under the described circumstances. (BZ#1595600)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2387", "url": "https://access.redhat.com/errata/RHSA-2018:2387" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "1566890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890" }, { "category": "external", "summary": "1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2387.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-02T07:06:12+00:00", "generator": { "date": "2025-08-02T07:06:12+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:2387", "initial_release_date": "2018-08-14T20:53:50+00:00", "revision_history": [ { "date": "2018-08-14T20:53:50+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-08-14T20:53:50+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T07:06:12+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.4::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-693.37.4.el7.x86_64", "product": { "name": "kernel-0:3.10.0-693.37.4.el7.x86_64", "product_id": "kernel-0:3.10.0-693.37.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.37.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.37.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.37.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.37.4.el7.x86_64", "product": { "name": "perf-0:3.10.0-693.37.4.el7.x86_64", "product_id": "perf-0:3.10.0-693.37.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.37.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.37.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.37.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.37.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.37.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-693.37.4.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-693.37.4.el7.x86_64", "product_id": "python-perf-0:3.10.0-693.37.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.37.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.37.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.37.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.37.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.37.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.37.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.37.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.37.4.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-693.37.4.el7.s390x", "product": { "name": "kernel-0:3.10.0-693.37.4.el7.s390x", "product_id": "kernel-0:3.10.0-693.37.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.37.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "product": { "name": "perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "product_id": "perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.37.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "product_id": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.37.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.37.4.el7.s390x", "product": { "name": "perf-0:3.10.0-693.37.4.el7.s390x", "product_id": "perf-0:3.10.0-693.37.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.37.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "product": { "name": "kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "product_id": "kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-693.37.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.37.4.el7.s390x", "product": { "name": "kernel-headers-0:3.10.0-693.37.4.el7.s390x", "product_id": "kernel-headers-0:3.10.0-693.37.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.37.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.37.4.el7.s390x", "product": { "name": "kernel-debug-0:3.10.0-693.37.4.el7.s390x", "product_id": "kernel-debug-0:3.10.0-693.37.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.37.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.37.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.37.4.el7.s390x", "product": { "name": "kernel-devel-0:3.10.0-693.37.4.el7.s390x", "product_id": "kernel-devel-0:3.10.0-693.37.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.37.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-693.37.4.el7.s390x", "product": { "name": "python-perf-0:3.10.0-693.37.4.el7.s390x", "product_id": "python-perf-0:3.10.0-693.37.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.37.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-693.37.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "product": { "name": "kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "product_id": "kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-693.37.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "product": { "name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "product_id": "kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.37.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "product": { "name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "product_id": "kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.37.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "product": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "product_id": "kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-693.37.4.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-693.37.4.el7.src", "product": { "name": "kernel-0:3.10.0-693.37.4.el7.src", "product_id": "kernel-0:3.10.0-693.37.4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.37.4.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-693.37.4.el7.ppc64", "product": { "name": "kernel-0:3.10.0-693.37.4.el7.ppc64", "product_id": "kernel-0:3.10.0-693.37.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.37.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "product": { "name": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "product_id": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.37.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "product_id": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.37.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.37.4.el7.ppc64", "product": { "name": "perf-0:3.10.0-693.37.4.el7.ppc64", "product_id": "perf-0:3.10.0-693.37.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.37.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "product": { "name": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "product_id": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.37.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "product": { "name": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "product_id": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.37.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.37.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "product": { "name": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "product_id": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.37.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-693.37.4.el7.ppc64", "product": { "name": "python-perf-0:3.10.0-693.37.4.el7.ppc64", "product_id": "python-perf-0:3.10.0-693.37.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.37.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "product_id": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.37.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "product": { "name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "product_id": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.37.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-693.37.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "product": { "name": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "product_id": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.37.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "product": { "name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "product_id": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.37.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "product": { "name": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "product_id": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.37.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "product": { "name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "product_id": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.37.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "product_id": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.37.4.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-693.37.4.el7.ppc64le", "product": { "name": "kernel-0:3.10.0-693.37.4.el7.ppc64le", "product_id": "kernel-0:3.10.0-693.37.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.37.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.37.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.37.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.37.4.el7.ppc64le", "product": { "name": "perf-0:3.10.0-693.37.4.el7.ppc64le", "product_id": "perf-0:3.10.0-693.37.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.37.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "product_id": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.37.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "product_id": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.37.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.37.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "product_id": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.37.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-693.37.4.el7.ppc64le", "product": { "name": "python-perf-0:3.10.0-693.37.4.el7.ppc64le", "product_id": "python-perf-0:3.10.0-693.37.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.37.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.37.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.37.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.37.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-693.37.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "product_id": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.37.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.37.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.37.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.37.4.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.37.4.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:3.10.0-693.37.4.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-693.37.4.el7.noarch", "product_id": "kernel-doc-0:3.10.0-693.37.4.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.37.4.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.37.4.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src" }, "product_reference": "kernel-0:3.10.0-693.37.4.el7.src", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.37.4.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.37.4.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.37.4.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src" }, "product_reference": "kernel-0:3.10.0-693.37.4.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.37.4.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.37.4.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.37.4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src" }, "product_reference": "kernel-0:3.10.0-693.37.4.el7.src", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.37.4.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.37.4.el7.noarch", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.37.4.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src" }, "product_reference": "kernel-0:3.10.0-693.37.4.el7.src", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.37.4.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.37.4.el7.noarch", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3620", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:53:50+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2387" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" }, { "acknowledgments": [ { "names": [ "Jann Horn" ], "organization": "Google Project Zero" }, { "names": [ "Ken Johnson" ], "organization": "Microsoft Security Response Center" } ], "cve": "CVE-2018-3639", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1566890" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative store bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3639" }, { "category": "external", "summary": "RHBZ#1566890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3639" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/ssbd", "url": "https://access.redhat.com/security/vulnerabilities/ssbd" }, { "category": "external", "summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528", "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528" }, { "category": "external", "summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf", "url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf" }, { "category": "external", "summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf", "url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html" } ], "release_date": "2018-05-21T21:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:53:50+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2387" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative store bypass" }, { "acknowledgments": [ { "names": [ "Intel OSSIRT" ], "organization": "Intel.com" } ], "cve": "CVE-2018-3646", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1585005" } ], "notes": [ { "category": "description", "text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: hw: cpu: L1 terminal fault (L1TF)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "RHBZ#1585005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3646", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3646" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646" }, { "category": "external", "summary": "https://access.redhat.com/articles/3562741", "url": "https://access.redhat.com/articles/3562741" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/L1TF", "url": "https://access.redhat.com/security/vulnerabilities/L1TF" }, { "category": "external", "summary": "https://foreshadowattack.eu/", "url": "https://foreshadowattack.eu/" }, { "category": "external", "summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow", "url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow" }, { "category": "external", "summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know", "url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know" } ], "release_date": "2018-08-14T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-14T20:53:50+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:2387" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: hw: cpu: L1 terminal fault (L1TF)" } ] }
cisco-sa-20180814-cpusidechannel
Vulnerability from csaf_cisco
Published
2018-08-14 17:00
Modified
2018-08-31 20:37
Summary
CPU Side-Channel Information Disclosure Vulnerabilities: August 2018
Notes
Summary
5On August 14th, 2018, three vulnerabilities were disclosed by Intel and security researchers that leverage a speculative execution side-channel method referred to as L1 Terminal Fault (L1TF) that affects modern Intel microprocessors. These vulnerabilities could allow an unprivileged, local attacker, in specific circumstances, to read privileged memory belonging to other processes.
The first vulnerability, CVE-2018-3615, affects Intel SGX technology and is referred to by the researchers who discovered it as foreshadow. This vulnerability is not known to affect any Cisco devices as the Cisco devices do not utilize Intel SGX technology.
The second vulnerability, CVE-2018-3620, and the third vulnerability, CVE-2018-3646, are referred to as L1 Terminal Fault attacks by Intel. These two vulnerabilities affect multi-core processors that leverage Intel Hyper-Threading technology supporting Operating System, System Management Mode, and Virtualized workloads. Like the previously disclosed Spectre vulnerabilities, all three new vulnerabilities leverage cache-timing attacks to infer any disclosed data.
To exploit any of these vulnerabilities, an attacker must be able to run crafted or script code on an affected device. Although the underlying CPU and operating system combination in a product or service may be affected by these vulnerabilities, the majority of Cisco products are closed systems that do not allow customers to run custom code and are, therefore, not vulnerable. There is no vector from which to exploit them. Cisco products are considered potentially vulnerable only if they allow customers to execute custom code side-by-side with Cisco code on the same microprocessor.
A Cisco product that may be deployed as a virtual machine or a container, even while not directly affected by any of these vulnerabilities, could be targeted by such attacks if the hosting environment is vulnerable. Cisco recommends that customers harden their virtual environments, tightly control user access, and ensure that all security updates are installed. Customers who are deploying products as a virtual device in multi-tenant hosting environments should ensure that the underlying hardware, as well as the operating system or hypervisor, is patched against the vulnerabilities in question.
Although Cisco cloud services are not directly affected by these vulnerabilities, the infrastructure on which they run may be impacted. See the Affected Products ["#ap"] section of this advisory for information about the impact of these vulnerabilities on Cisco cloud services.
Cisco will release software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel"]
Affected Products
Any product or service not listed in the Vulnerable Products ["#vp"] section of this advisory is to be considered not vulnerable. The criteria for considering whether a product is vulnerable is explained in the Summary ["#sum"] section of this advisory.
Because this is an ongoing investigation, please be aware that products and services currently considered not vulnerable may subsequently be considered vulnerable as additional information becomes available.
Products Under Investigation The following products are under active investigation to determine whether they are affected by the vulnerability that is described in this advisory:
Network Application, Service, and Acceleration
Cisco Virtual Wide Area Application Services (vWAAS)
Cisco Wide Area Application Services (WAAS) Express
Cisco Wide Area Application Services (WAAS) Software
Network and Content Security Devices
Cisco FireSIGHT System
Routing and Switching - Enterprise and Service Provider
Cisco ASR 9000 XR 64-bit Series Routers
Cisco Industrial Ethernet 4000 Series Switches (IOx feature)
Cisco NCS 1000 Series Routers
Cisco NCS 5000 Series Routers
Cisco NCS 5500 Series Routers
Cisco XRv 9000 Series Routers
Vulnerable Products
Product Cisco Bug ID Fixed Release Availability Network Application, Service, and Acceleration Cisco Cloud Services Platform 2100 CSCvm02914 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02914"]
Routing and Switching - Enterprise and Service Provider Cisco 4000 Series Integrated Services Routers (IOS XE Open Service Containers) CSCvm02977 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02977"]
Cisco ASR 1000 Series Aggregation Services Router with RP2 or RP3 (IOS XE Open Service Containers) CSCvm02977 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02977"]
Cisco ASR 1001-HX Series Aggregation Services Routers (IOS XE Open Service Containers) CSCvm02977 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02977"]
Cisco ASR 1001-X Series Aggregation Services Routers (IOS XE Open Service Containers) CSCvm02977 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02977"]
Cisco ASR 1002-HX Series Aggregation Services Routers (IOS XE Open Service Containers) CSCvm02977 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02977"]
Cisco ASR 1002-X Series Aggregation Services Routers (IOS XE Open Service Containers) CSCvm02977 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02977"]
Cisco Cloud Services Router 1000V Series (IOS XE Open Service Containers) CSCvm02977 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02977"]
Cisco Nexus 3000 Series Switches CSCvm02926 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02926"]
Cisco Nexus 3500 Series Switches CSCvm02929 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02929"]
Cisco Nexus 5000 Series Switches CSCvm02930 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02930"]
Cisco Nexus 7000 Series Switches CSCvm02924 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02924"]
Cisco Nexus 9000 Series Switches - Standalone, NX-OS mode CSCvm02926 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02926"]
Unified Computing Cisco C880 M4 Server CSCvm02911 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02911"]
Cisco C880 M5 Server CSCvm02911 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02911"]
Cisco Enterprise NFV Infrastructure Software (NFVIS) CSCvm02987 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02987"]
Cisco HyperFlex System CSCvm02920 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02920"]
Cisco UCS B-Series M2 Blade Servers CSCvm02934 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02934"] Cisco UCS B-Series M2 Blade Servers - Managed
UCS Manager 2.2(8l) - (Available)
UCS Manager 3.2(3g) - (Available)
Cisco UCS C-Series M2 Rack Servers - Managed
UCS Manager 2.2(8l) - (Available)
Cisco IMC 1.4(3z09)(Available)
Cisco IMC 1.5(9f)(Available)
Cisco UCS B-Series M3 Blade Servers - Managed CSCvm03356 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm03356"] Cisco UCS B-Series M3 Blade Servers - Managed
UCS Manager 2.2(8l) (Available)
UCS Manager 3.1(3j) (Available)
UCS Manager 3.2(3g) (Available)
UCS C-Series M3 Rack Servers - Managed
UCS Manager 3.2(3g) - (Available)
UCS Manager 3.1(3j) - (Available)
UCS Manager 2.2(8l) - (Available)
Cisco IMC 3.0(4i) - (Available)
Cisco IMC 2.0(9o) - (Available) Cisco UCS B-Series M4 Blade Servers (except B260, B460) CSCvm03351 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm03351"] Cisco UCS B-Series M4 Blade Servers (except B260
B460)
UCS Manager 3.2(3e) - (Available)
UCS Manager 3.1(3j) - (Available)
UCS Manager 2.2(8l) - (Available)
Cisco UCS C-Series M4 Rack Servers - Managed (except C460) - UCS Manager 3.2(3e) - (Available)
Cisco UCS S3260 M4 Storage Server - Managed - UCS Manager 3.2(3e) - (Available)
Cisco UCS S3260 M4 Storage Server - Standalone - Cisco IMC 3.0(4e) - (Available)
Cisco UCS S3260 M4 Storage Server - UCS Manager 3.1(3j) - (Available)
Cisco UCS C-Series M4 Rack Servers
Cisco IMC 3.0(4e) - (Available)
Cisco IMC 2.0(10k) - (Available)
Cisco UCS S3260 M4 Storage Server
UCS Manager 3.2(3e) - (Available)
UCS Manager 3.1(3j) - (Available)
UCS Manager 2.2(8l) - (Available)
Cisco UCS C-Series M4 Rack Servers - Managed (except C460) - UCS Manager 3.2(3e) - (Available)
Cisco UCS S3260 M4 Storage Server - Managed - UCS Manager 3.2(3e) - (Available)
Cisco UCS S3260 M4 Storage Server - Standalone - Cisco IMC 3.0(4e) - (Available)
Cisco UCS S3260 M4 Storage Cisco UCS B-Series M5 Blade Servers CSCvm03339 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm03339"] Cisco UCS B-Series M5 Blade Servers
UCS Manager 3.2(3g) - (Available)
Cisco UCS C-Series M5 Rack Servers -Standalone
Cisco IMC 3.1(2i) - (Available)
Cisco UCS C-Series M5 Rack Servers - Managed
UCS Manager 3.2(3g) - (Available)
Cisco UCS C-Series M2 Rack Servers CSCvm02934 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02934"] Cisco UCS B-Series M2 Blade Servers - Managed
UCS Manager 2.2(8l) - (Available)
UCS Manager 3.2(3g) - (Available)
Cisco UCS C-Series M2 Rack Servers - Managed
UCS Manager 2.2(8l) - (Available)
Cisco IMC 1.4(3z09)(Available)
Cisco IMC 1.5(9f)(Available)
Cisco UCS C-Series M3 Rack Servers - Managed CSCvm03356 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm03356"] Cisco UCS B-Series M3 Blade Servers - Managed
UCS Manager 2.2(8l) (Available)
UCS Manager 3.1(3j) (Available)
UCS Manager 3.2(3g) (Available)
UCS C-Series M3 Rack Servers - Managed
UCS Manager 3.2(3g) - (Available)
UCS Manager 3.1(3j) - (Available)
UCS Manager 2.2(8l) - (Available)
Cisco IMC 3.0(4i) - (Available)
Cisco IMC 2.0(9o) - (Available) Cisco UCS C-Series M3 Rack Servers - Standalone CSCvm03357 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm03357"] UCS Manager 3.2(3g) - (Available)
UCS Manager 3.1(3j) - (Available)
UCS Manager 2.2(8l) - (Available)
Cisco IMC 3.0(4i) - (Available)
Cisco IMC 2.0(9o) - (Available) Cisco UCS C-Series M4 Rack Servers (except C460) - Standalone 1 CSCvm03353 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm03353"] Cisco IMC 3.0(4e) - (Available)
Cisco IMC 2.0(10k) - (Available) Cisco UCS C-Series M4 Rack Servers (except C460) -Managed 1 CSCvm03351 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm03351"] Cisco UCS B-Series M4 Blade Servers (except B260
B460)
UCS Manager 3.2(3e) - (Available)
UCS Manager 3.1(3j) - (Available)
UCS Manager 2.2(8l) - (Available)
Cisco UCS C-Series M4 Rack Servers - Managed (except C460) - UCS Manager 3.2(3e) - (Available)
Cisco UCS S3260 M4 Storage Server - Managed - UCS Manager 3.2(3e) - (Available)
Cisco UCS S3260 M4 Storage Server - Standalone - Cisco IMC 3.0(4e) - (Available)
Cisco UCS S3260 M4 Storage Server - UCS Manager 3.1(3j) - (Available)
Cisco UCS C-Series M4 Rack Servers
Cisco IMC 3.0(4e) - (Available)
Cisco IMC 2.0(10k) - (Available)
Cisco UCS S3260 M4 Storage Server
UCS Manager 3.2(3e) - (Available)
UCS Manager 3.1(3j) - (Available)
UCS Manager 2.2(8l) - (Available)
Cisco UCS C-Series M4 Rack Servers - Managed (except C460) - UCS Manager 3.2(3e) - (Available)
Cisco UCS S3260 M4 Storage Server - Managed - UCS Manager 3.2(3e) - (Available)
Cisco UCS S3260 M4 Storage Server - Standalone - Cisco IMC 3.0(4e) - (Available)
Cisco UCS S3260 M4 Storage Cisco UCS C-Series M5 Rack Servers - Managed 1 CSCvm03339 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm03339"] Cisco UCS B-Series M5 Blade Servers
UCS Manager 3.2(3g) - (Available)
Cisco UCS C-Series M5 Rack Servers -Standalone
Cisco IMC 3.1(2i) - (Available)
Cisco UCS C-Series M5 Rack Servers - Managed
UCS Manager 3.2(3g) - (Available)
Cisco UCS C-Series M5 Rack Servers -Standalone 1 CSCvm03347 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm03347"] Cisco UCS B-Series M5 Blade Servers
UCS Manager 3.2(3g) - (Available)
Cisco UCS C-Series M5 Rack Servers -Standalone
Cisco IMC 3.1(2i) - (Available) Cisco UCS E-Series Servers CSCvm02902 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02902"]
Cisco UCS S3260 M4 Storage Server CSCvm03351 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm03351"] Cisco UCS B-Series M4 Blade Servers (except B260
B460)
UCS Manager 3.2(3e) - (Available)
UCS Manager 3.1(3j) - (Available)
UCS Manager 2.2(8l) - (Available)
Cisco UCS C-Series M4 Rack Servers - Managed (except C460) - UCS Manager 3.2(3e) - (Available)
Cisco UCS S3260 M4 Storage Server - Managed - UCS Manager 3.2(3e) - (Available)
Cisco UCS S3260 M4 Storage Server - Standalone - Cisco IMC 3.0(4e) - (Available)
Cisco UCS S3260 M4 Storage Server - UCS Manager 3.1(3j) - (Available)
Cisco UCS C-Series M4 Rack Servers
Cisco IMC 3.0(4e) - (Available)
Cisco IMC 2.0(10k) - (Available)
Cisco UCS S3260 M4 Storage Server
UCS Manager 3.2(3e) - (Available)
UCS Manager 3.1(3j) - (Available)
UCS Manager 2.2(8l) - (Available)
Cisco UCS C-Series M4 Rack Servers - Managed (except C460) - UCS Manager 3.2(3e) - (Available)
Cisco UCS S3260 M4 Storage Server - Managed - UCS Manager 3.2(3e) - (Available)
Cisco UCS S3260 M4 Storage Server - Standalone - Cisco IMC 3.0(4e) - (Available)
Cisco UCS S3260 M4 Storage Voice and Unified Communications Devices Cisco Remote Expert Mobile CSCvm02994 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02994"]
Video, Streaming, TelePresence, and Transcoding Devices Cisco Video Surveillance Media Server CSCvm04841 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm04841"]
Cisco Cloud Hosted Services Cisco Metacloud CSCvm02969 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02969"]
1Cisco UCS M4 and M5 Rack Servers are used as part of the Cisco HyperFlex Solution.
Products Confirmed Not Vulnerable
The following Cisco products are considered not vulnerable to foreshadow or other identified L1 Terminal Fault-related vulnerabilities. Specific models in these product families may be affected and will be explicitly listed in the preceding Vulnerable Products ["#vp"] section.
Routers Branch Routers
Cisco 4000 Series Integrated Services Routers
Cisco 1900 Series Integrated Services Routers
Cisco 1800 Series Integrated Services Routers
Cisco 1000 Series Integrated Services Routers
Cisco 2900 Series Integrated Services Routers
Cisco 3900 Series Integrated Services Routers
Cisco 800 Series Routers
Data Center Interconnect Platforms
Cisco ASR 1000 Series Aggregation Services Routers
Cisco Carrier Routing System
Cisco Catalyst 6500 Series Switches
Industrial Routers
Cisco 2000 Series Connected Grid Routers
Cisco 1000 Series Connected Grid Routers
Cisco 900 Series Industrial Routers
Cisco 800 Series Industrial Integrated Services Routers
Cisco 500 Series WPAN Industrial Routers
Cisco Wireless Gateway for LoRaWAN
Cloud Networking Services
Cisco Cloud Services Router 1000V Series
Mobile Internet Routers
Cisco 5900 Series Embedded Services Routers
Cisco MWR 2900 Series Mobile Wireless Routers
Service Provider Core Routers
Cisco Carrier Routing System
Cisco Network Convergence System 6000 Series Routers
Service Provider Edge Routers
Cisco 12000 Series Routers
Cisco ASR 1000 Series Aggregation Services Routers
Cisco ASR 920 Series Aggregation Services Router
Cisco ASR 901 Series Aggregation Services Routers
Cisco ASR 900 Series Aggregation Services Routers
Cisco XR 12000 Series Router
Cisco Network Convergence System 500 Series Routers
Small Business Routers
Cisco 1900 Series Integrated Services Routers
Cisco 800 Series Routers
Cisco Small Business RV Series Routers
Virtual Routers
Cisco Cloud Services Router 1000V Series
Cisco WAN Aggregation and Internet Edge Routers
Cisco ASR 1000 Series Aggregation Services Routers
Cisco Catalyst 6500 Series Switches
Switches
Blade Switches
Cisco Blade Switches for Dell
Cisco Blade Switches for FSC
Cisco Blade Switches for HP
Cisco Nexus 4000 Series Switches
Cisco Switch Modules for IBM
Cisco SFS Solutions for Blade Switches
Cisco SFS Solution for Dell
Campus LAN Switches - Access
Cisco Catalyst 4500 Series Switches
Cisco Catalyst 3850 Series Switches
Cisco Catalyst 3750 Series Switches
Cisco Catalyst 2960-L Series Switches
Cisco Catalyst 2960-Plus Series Switches
Cisco Catalyst 2960-X Series Switches
Cisco Edge Series
Cisco Meraki Cloud Managed Switches
Cisco Redundant Power Systems
Campus LAN Switches - Core and Distribution
Cisco Catalyst 9500 Series Switches
Cisco Catalyst 6800 Series Switches
Cisco Catalyst 6500 Series Switches
Cisco Catalyst 6500 Virtual Switching System 1440
Cisco Catalyst 4900 Series Switches
Cisco Catalyst 4500 Series Switches
Cisco Catalyst 4500-X Series Switches
Cisco Catalyst 3850 Series Switches
Campus LAN Switches - Digital Building
Cisco Catalyst 3560-CX Series Switches
Cisco Catalyst 2960-C Series Switches
Cisco Catalyst 2960-CX Series Switches
Cisco Catalyst 2960-L Series Switches
Cisco Catalyst Digital Building Series Switches
Data Center Switches
Cisco Nexus 2000 Series Fabric Extenders
Cisco R Series Racks
Cisco RP Series Power Distribution Units
Cisco Data Center Network Management
Cisco Data Center Network Manager
Cisco Fabric Manager
Cisco MDS 9000 Series Multilayer Switches
Cisco Data Center Switches with Cisco IOS Software
Cisco Catalyst 6500 Series Switches
Cisco Catalyst 4900 Series Switches
Cisco Energy and Asset Management
Cisco Asset Management Suite
Cisco Energy Management Suite
Industrial Ethernet Switches
Cisco 2500 Series Connected Grid Switches
Cisco Embedded Service 2020 Series Switches
Cisco Industrial Ethernet 5000 Series Switches
Cisco Industrial Ethernet 4010 Series Switches
Cisco Industrial Ethernet 4000 Series Switches
Cisco Industrial Ethernet 3010 Series Switches
Cisco Industrial Ethernet 3000 Series Switches
Cisco Industrial Ethernet 2000 Series Switches
Cisco Industrial Ethernet 2000U Series Switches
Cisco Industrial Ethernet 1000 Series Switches
InfiniBand Switches
Cisco SFS 7000 Series InfiniBand Server Switches
Cisco SFS 3500 Series Multifabric Server Switches
Cisco SFS 3000 Series Multifabric Server Switches
LAN Switches - Small Business
Cisco 550X Series Stackable Managed Switches
Cisco 350 Series Managed Switches
Cisco 350X Series Stackable Managed Switches
Cisco 250 Series Smart Switches
Cisco 220 Series Smart Switches
Cisco ESW2 Series Advanced Switches
Cisco Small Business 300 Series Managed Switches
Cisco Small Business 200 Series Smart Switches
Cisco Small Business 110 Series Unmanaged Switches
Cisco Small Business Smart Switches
Cisco Small Business Stackable Managed Switches
Cisco Small Business Unmanaged Switches
Service Provider Switches - Aggregation
Cisco Catalyst 6500 Series Switches
Cisco Catalyst 4500 Series Switches
Cisco ME 4900 Series Ethernet Switches
Cisco ME 3800X Series Carrier Ethernet Switch Routers
Service Provider Switches - Ethernet Access
Cisco Catalyst 3750 Metro Series Switches
Cisco ME 3600X Series Ethernet Access Switches
Cisco ME 3400 Series Ethernet Access Switches
Cisco ME 3400E Series Ethernet Access Switches
Cisco ME 1200 Series Carrier Ethernet Access Devices
Cisco Small Business Gigabit SP Switches
Virtual Networking
Cisco Application Centric Infrastructure Virtual Edge
Cisco Application Virtual Switch
Cisco Cloud Services Platform 2100
Cisco Nexus 1000V InterCloud
Cisco Nexus 1000V Switch for KVM
Cisco Nexus 1000V Switch for Microsoft Hyper-V
Cisco Nexus 1000V Switch for VMware vSphere
Cloud Networking Services
Cisco Prime Virtual Network Analysis Module (vNAM)
Cisco Virtual Security Gateway
WAN Switches
Cisco IGX 8400 Series Switches
MGX Switches
Cisco MGX 8900 Series Switches
Cisco MGX 8850 Software
Cisco MGX 8800 Series Switches
Cisco MGX 8250 Software
Cisco MGX 8200 Series Edge Concentrators
Wireless
Indoor Access Points
Cisco Aironet 1815 Series Access Points
Cisco Aironet 2800 Series Access Points
Cisco Aironet 3800 Series Access Points
Cisco Aironet 4800 Access Point
Outdoor and Industrial Access Points
Cisco Aironet 1540 Series Access Points
Cisco Aironet 1560 Series Access Points
Cisco Aironet 1570 Series Access Points
Wireless LAN Controllers
Cisco Virtual Wireless Controller
Cisco Meraki Cloud Managed Access Points
Security
Cisco Cloud-Hosted Products
Cisco AMP family of products and endpoint protection clients
Cisco Cloud Security
Cisco Cloudlock
Cisco Umbrella
Email Security
Cisco Content Security Management Appliance
Cisco Email Security
Cisco Email Encryption
Cisco Email Encryption
Cisco Registered Envelope Service
Firewalls
Cisco 3000 Series Industrial Security Appliances (ISA)
Cisco Meraki Cloud Managed Security Appliances
Cisco Adaptive Security Appliances (ASA)
Cisco Adaptive Security Virtual Appliance (ASAv)
Firewall Management
Cisco Adaptive Security Device Manager
Cisco Firepower Device Manager
Cisco Firepower Management Center
Cisco Security Manager
Next-Generation Firewalls (NGFW)
Cisco ASA 5500-X with FirePOWER Services
Cisco Firepower 9000 Series
Cisco Firepower 4100 Series
Cisco Firepower 2100 Series
Network Security
Cisco VPN Internal Service Module for ISR G2
Network Visibility and Segmentation
Cisco ISE Passive Identity Connector
Cisco Security Packet Analyzer
Cisco Stealthwatch Cloud
Cisco Stealthwatch Enterprise
Next-Generation Intrusion Prevention System (NGIPS)
Cisco FirePOWER 8000 Series Appliances
Cisco FirePOWER 7000 Series Appliances
Security Management
Cisco Firepower Management Center
Cisco Adaptive Security Device Manager
Cisco Content Security Management Appliance
Cisco Defense Orchestrator
Unified Communications
Cisco Business Edition 6000 - 100x80
Cisco Business Edition 6000
Cisco Jabber - 100x80
Cisco Jabber
Cisco Expressway
Customer Care
Cisco Unified Contact Center Express
Cisco Unified Contact Center Enterprise
Cisco Finesse
Cisco MediaSense
Conferencing
Cisco Meeting Server
Cisco Webex Meeting Center
Cisco Webex Meetings Server
Cisco TelePresence Management Suite
Cisco TelePresence Server
Cisco TelePresence Conductor
Collaboration Endpoints
Cisco 8800 Series IP Phones
Cisco 7800 Series IP Phones
Cisco 6900 Series IP Phones
Cisco 3900 Series SIP Phones
Cisco Desktop Collaboration Experience - DX600 Series
Cisco DX Series
Cisco TelePresence SX10 Quick Set
Cisco TelePresence MX Series
Cisco TelePresence IX5000 Series
Cisco Unified Computing Management Platforms
Cisco Intersight
Cisco UCS Manager
Cisco UCS Central
Cisco UCS Performance Manager
IP Video
Cisco Access Edge
Cisco Cable Modem Termination Systems (CMTSs)
Cisco RF Switches
Cisco cBR Series Converged Broadband Routers
Cisco uBR10000 Series Universal Broadband Routers
Cisco uBR7225VXR Universal Broadband Routers
Cisco uBR7200 Series Universal Broadband Routers
No other Cisco IP video products are known to be affected.
Internet of Things (IoT)
Cisco Jasper Control Center
Cisco IoT Management
Cisco Application Enablement
Cisco IoT Security
Cisco Kinetic
Cisco Extended Enterprise
Cisco has investigated the following products and they are not considered to be affected by the vulnerabilities that are described in this advisory:
Collaboration and Social Media
Cisco Meeting Server
Network Application, Service, and Acceleration
Cisco Tetration Analytics
Network and Content Security Devices
Cisco Identity Services Engine (ISE)
Cisco Umbrella Virtual Appliance
Network Management and Provisioning
Cisco Evolved Programmable Network Manager
Cisco Policy Suite
Cisco Prime Infrastructure
Routing and Switching - Enterprise and Service Provider
Cisco 1000 Series Connected Grid Routers
Cisco 800 Series Industrial Integrated Services Routers
Cisco Application Policy Infrastructure Controller (APIC)
Cisco Catalyst 3650 Series Switches - IOx feature
Cisco Nexus 4000 Series Blade Switches
Cisco Nexus 9000 Series Fabric Switches - ACI mode
Cisco Virtual Application Policy Infrastructure Controller (APIC)
Unified Computing
Cisco Common Services Platform Collector
Cisco UCS Director
Voice and Unified Communications Devices
Cisco Meeting Management
Cisco Unified Communications Manager Session Management Edition
Cisco Unified Communications Manager
Video, Streaming, TelePresence, and Transcoding Devices
Cisco TelePresence Conductor
Cisco TelePresence ISDN Gateway 3241
Cisco TelePresence ISDN Gateway MSE 8321
Cisco TelePresence MCU 4200 Series, 4500 Series, 5300 Series, MSE 8420, and MSE 8510
Cisco TelePresence Server 7010 and MSE 8710
Cisco TelePresence Server on Multiparty Media 310 and 320
Cisco TelePresence Server on Multiparty Media 820
Cisco TelePresence Server on Virtual Machine
Cisco TelePresence Supervisor MSE 8050
Tandberg Codian ISDN Gateway 3210, 3220, and 3240
Tandberg Codian MSE 8320
Wireless
Cisco Mobility Services Engine
Cisco Wireless Gateway for LoRaWAN
Cisco Wireless LAN Controller
Cisco Cloud Hosted Services
Cisco Cloudlock
Cisco Hosted Collaboration Solution (HCS) for Government
Cisco Umbrella
Cisco Webex Teams (formerly Cisco Spark)
Workarounds
There are no workarounds that address this vulnerability.
Fixed Software
For information about fixed software releases, consult the Cisco bug ID(s) at the top of this advisory.
When considering software upgrades, customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page ["https://www.cisco.com/go/psirt"], to determine exposure and a complete upgrade solution.
In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.
Vulnerability Policy
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy ["https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.
Exploitation and Public Announcements
The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Source
CVE ID CVE-2018-3615 was reported to Intel by Raoul Strackx, Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, and Yuval Yarom.
CVE ID CVE-2018-3620 and CVE-2018-3646 were discovered by Intel during the research of foreshadow.
Legal Disclaimer
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. CISCO EXPECTS TO UPDATE THIS DOCUMENT AS NEW INFORMATION BECOMES AVAILABLE.
A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.
{ "document": { "acknowledgments": [ { "summary": "CVE ID CVE-2018-3615 was reported to Intel by Raoul Strackx, Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, and Yuval Yarom.\r\n\r\nCVE ID CVE-2018-3620 and CVE-2018-3646 were discovered by Intel during the research of foreshadow." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "notes": [ { "category": "summary", "text": "5On August 14th, 2018, three vulnerabilities were disclosed by Intel and security researchers that leverage a speculative execution side-channel method referred to as L1 Terminal Fault (L1TF) that affects modern Intel microprocessors. These vulnerabilities could allow an unprivileged, local attacker, in specific circumstances, to read privileged memory belonging to other processes.\r\nThe first vulnerability, CVE-2018-3615, affects Intel SGX technology and is referred to by the researchers who discovered it as foreshadow. This vulnerability is not known to affect any Cisco devices as the Cisco devices do not utilize Intel SGX technology.\r\n\r\nThe second vulnerability, CVE-2018-3620, and the third vulnerability, CVE-2018-3646, are referred to as L1 Terminal Fault attacks by Intel. These two vulnerabilities affect multi-core processors that leverage Intel Hyper-Threading technology supporting Operating System, System Management Mode, and Virtualized workloads. Like the previously disclosed Spectre vulnerabilities, all three new vulnerabilities leverage cache-timing attacks to infer any disclosed data.\r\n\r\nTo exploit any of these vulnerabilities, an attacker must be able to run crafted or script code on an affected device. Although the underlying CPU and operating system combination in a product or service may be affected by these vulnerabilities, the majority of Cisco products are closed systems that do not allow customers to run custom code and are, therefore, not vulnerable. There is no vector from which to exploit them. Cisco products are considered potentially vulnerable only if they allow customers to execute custom code side-by-side with Cisco code on the same microprocessor.\r\n\r\nA Cisco product that may be deployed as a virtual machine or a container, even while not directly affected by any of these vulnerabilities, could be targeted by such attacks if the hosting environment is vulnerable. Cisco recommends that customers harden their virtual environments, tightly control user access, and ensure that all security updates are installed. Customers who are deploying products as a virtual device in multi-tenant hosting environments should ensure that the underlying hardware, as well as the operating system or hypervisor, is patched against the vulnerabilities in question.\r\n\r\nAlthough Cisco cloud services are not directly affected by these vulnerabilities, the infrastructure on which they run may be impacted. See the Affected Products [\"#ap\"] section of this advisory for information about the impact of these vulnerabilities on Cisco cloud services.\r\n\r\nCisco will release software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.\r\n\r\nThis advisory is available at the following link:\r\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel\"]", "title": "Summary" }, { "category": "general", "text": "Any product or service not listed in the Vulnerable Products [\"#vp\"] section of this advisory is to be considered not vulnerable. The criteria for considering whether a product is vulnerable is explained in the Summary [\"#sum\"] section of this advisory.\r\n\r\nBecause this is an ongoing investigation, please be aware that products and services currently considered not vulnerable may subsequently be considered vulnerable as additional information becomes available.\r\n\r\n Products Under Investigation The following products are under active investigation to determine whether they are affected by the vulnerability that is described in this advisory:\r\n\r\nNetwork Application, Service, and Acceleration\r\n\r\nCisco Virtual Wide Area Application Services (vWAAS)\r\nCisco Wide Area Application Services (WAAS) Express\r\nCisco Wide Area Application Services (WAAS) Software\r\nNetwork and Content Security Devices\r\n\r\nCisco FireSIGHT System\r\nRouting and Switching - Enterprise and Service Provider\r\n\r\nCisco ASR 9000 XR 64-bit Series Routers\r\nCisco Industrial Ethernet 4000 Series Switches (IOx feature)\r\nCisco NCS 1000 Series Routers\r\nCisco NCS 5000 Series Routers\r\nCisco NCS 5500 Series Routers\r\nCisco XRv 9000 Series Routers", "title": "Affected Products" }, { "category": "general", "text": "Product Cisco Bug ID Fixed Release Availability Network Application, Service, and Acceleration Cisco Cloud Services Platform 2100 CSCvm02914 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02914\"]\r\n Routing and Switching - Enterprise and Service Provider Cisco 4000 Series Integrated Services Routers (IOS XE Open Service Containers) CSCvm02977 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02977\"]\r\n Cisco ASR 1000 Series Aggregation Services Router with RP2 or RP3 (IOS XE Open Service Containers) CSCvm02977 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02977\"]\r\n Cisco ASR 1001-HX Series Aggregation Services Routers (IOS XE Open Service Containers) CSCvm02977 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02977\"]\r\n Cisco ASR 1001-X Series Aggregation Services Routers (IOS XE Open Service Containers) CSCvm02977 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02977\"]\r\n Cisco ASR 1002-HX Series Aggregation Services Routers (IOS XE Open Service Containers) CSCvm02977 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02977\"]\r\n Cisco ASR 1002-X Series Aggregation Services Routers (IOS XE Open Service Containers) CSCvm02977 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02977\"]\r\n Cisco Cloud Services Router 1000V Series (IOS XE Open Service Containers) CSCvm02977 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02977\"]\r\n Cisco Nexus 3000 Series Switches CSCvm02926 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02926\"]\r\n Cisco Nexus 3500 Series Switches CSCvm02929 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02929\"]\r\n Cisco Nexus 5000 Series Switches CSCvm02930 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02930\"]\r\n Cisco Nexus 7000 Series Switches CSCvm02924 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02924\"]\r\n Cisco Nexus 9000 Series Switches - Standalone, NX-OS mode CSCvm02926 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02926\"]\r\n Unified Computing Cisco C880 M4 Server CSCvm02911 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02911\"]\r\n Cisco C880 M5 Server CSCvm02911 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02911\"]\r\n Cisco Enterprise NFV Infrastructure Software (NFVIS) CSCvm02987 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02987\"]\r\n Cisco HyperFlex System CSCvm02920 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02920\"]\r\n Cisco UCS B-Series M2 Blade Servers CSCvm02934 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02934\"] Cisco UCS B-Series M2 Blade Servers - Managed\r\nUCS Manager 2.2(8l) - (Available)\r\nUCS Manager 3.2(3g) - (Available)\r\nCisco UCS C-Series M2 Rack Servers - Managed\r\nUCS Manager 2.2(8l) - (Available)\r\nCisco IMC 1.4(3z09)(Available)\r\nCisco IMC 1.5(9f)(Available)\r\n Cisco UCS B-Series M3 Blade Servers - Managed CSCvm03356 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm03356\"] Cisco UCS B-Series M3 Blade Servers - Managed\r\nUCS Manager 2.2(8l) (Available)\r\nUCS Manager 3.1(3j) (Available)\r\nUCS Manager 3.2(3g) (Available)\r\nUCS C-Series M3 Rack Servers - Managed\r\nUCS Manager 3.2(3g) - (Available)\r\nUCS Manager 3.1(3j) - (Available)\r\nUCS Manager 2.2(8l) - (Available)\r\nCisco IMC 3.0(4i) - (Available)\r\nCisco IMC 2.0(9o) - (Available) Cisco UCS B-Series M4 Blade Servers (except B260, B460) CSCvm03351 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm03351\"] Cisco UCS B-Series M4 Blade Servers (except B260\r\nB460)\r\nUCS Manager 3.2(3e) - (Available)\r\nUCS Manager 3.1(3j) - (Available)\r\nUCS Manager 2.2(8l) - (Available)\r\nCisco UCS C-Series M4 Rack Servers - Managed (except C460) - UCS Manager 3.2(3e) - (Available)\r\nCisco UCS S3260 M4 Storage Server - Managed - UCS Manager 3.2(3e) - (Available)\r\nCisco UCS S3260 M4 Storage Server - Standalone - Cisco IMC 3.0(4e) - (Available)\r\nCisco UCS S3260 M4 Storage Server - UCS Manager 3.1(3j) - (Available)\r\nCisco UCS C-Series M4 Rack Servers\r\nCisco IMC 3.0(4e) - (Available)\r\nCisco IMC 2.0(10k) - (Available)\r\nCisco UCS S3260 M4 Storage Server\r\nUCS Manager 3.2(3e) - (Available)\r\nUCS Manager 3.1(3j) - (Available)\r\nUCS Manager 2.2(8l) - (Available)\r\nCisco UCS C-Series M4 Rack Servers - Managed (except C460) - UCS Manager 3.2(3e) - (Available)\r\nCisco UCS S3260 M4 Storage Server - Managed - UCS Manager 3.2(3e) - (Available)\r\nCisco UCS S3260 M4 Storage Server - Standalone - Cisco IMC 3.0(4e) - (Available)\r\nCisco UCS S3260 M4 Storage Cisco UCS B-Series M5 Blade Servers CSCvm03339 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm03339\"] Cisco UCS B-Series M5 Blade Servers\r\nUCS Manager 3.2(3g) - (Available)\r\nCisco UCS C-Series M5 Rack Servers -Standalone\r\nCisco IMC 3.1(2i) - (Available)\r\nCisco UCS C-Series M5 Rack Servers - Managed\r\nUCS Manager 3.2(3g) - (Available)\r\n Cisco UCS C-Series M2 Rack Servers CSCvm02934 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02934\"] Cisco UCS B-Series M2 Blade Servers - Managed\r\nUCS Manager 2.2(8l) - (Available)\r\nUCS Manager 3.2(3g) - (Available)\r\nCisco UCS C-Series M2 Rack Servers - Managed\r\nUCS Manager 2.2(8l) - (Available)\r\nCisco IMC 1.4(3z09)(Available)\r\nCisco IMC 1.5(9f)(Available)\r\n Cisco UCS C-Series M3 Rack Servers - Managed CSCvm03356 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm03356\"] Cisco UCS B-Series M3 Blade Servers - Managed\r\nUCS Manager 2.2(8l) (Available)\r\nUCS Manager 3.1(3j) (Available)\r\nUCS Manager 3.2(3g) (Available)\r\nUCS C-Series M3 Rack Servers - Managed\r\nUCS Manager 3.2(3g) - (Available)\r\nUCS Manager 3.1(3j) - (Available)\r\nUCS Manager 2.2(8l) - (Available)\r\nCisco IMC 3.0(4i) - (Available)\r\nCisco IMC 2.0(9o) - (Available) Cisco UCS C-Series M3 Rack Servers - Standalone CSCvm03357 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm03357\"] UCS Manager 3.2(3g) - (Available)\r\nUCS Manager 3.1(3j) - (Available)\r\nUCS Manager 2.2(8l) - (Available)\r\nCisco IMC 3.0(4i) - (Available)\r\nCisco IMC 2.0(9o) - (Available) Cisco UCS C-Series M4 Rack Servers (except C460) - Standalone 1 CSCvm03353 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm03353\"] Cisco IMC 3.0(4e) - (Available)\r\nCisco IMC 2.0(10k) - (Available) Cisco UCS C-Series M4 Rack Servers (except C460) -Managed 1 CSCvm03351 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm03351\"] Cisco UCS B-Series M4 Blade Servers (except B260\r\nB460)\r\nUCS Manager 3.2(3e) - (Available)\r\nUCS Manager 3.1(3j) - (Available)\r\nUCS Manager 2.2(8l) - (Available)\r\nCisco UCS C-Series M4 Rack Servers - Managed (except C460) - UCS Manager 3.2(3e) - (Available)\r\nCisco UCS S3260 M4 Storage Server - Managed - UCS Manager 3.2(3e) - (Available)\r\nCisco UCS S3260 M4 Storage Server - Standalone - Cisco IMC 3.0(4e) - (Available)\r\nCisco UCS S3260 M4 Storage Server - UCS Manager 3.1(3j) - (Available)\r\nCisco UCS C-Series M4 Rack Servers\r\nCisco IMC 3.0(4e) - (Available)\r\nCisco IMC 2.0(10k) - (Available)\r\nCisco UCS S3260 M4 Storage Server\r\nUCS Manager 3.2(3e) - (Available)\r\nUCS Manager 3.1(3j) - (Available)\r\nUCS Manager 2.2(8l) - (Available)\r\nCisco UCS C-Series M4 Rack Servers - Managed (except C460) - UCS Manager 3.2(3e) - (Available)\r\nCisco UCS S3260 M4 Storage Server - Managed - UCS Manager 3.2(3e) - (Available)\r\nCisco UCS S3260 M4 Storage Server - Standalone - Cisco IMC 3.0(4e) - (Available)\r\nCisco UCS S3260 M4 Storage Cisco UCS C-Series M5 Rack Servers - Managed 1 CSCvm03339 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm03339\"] Cisco UCS B-Series M5 Blade Servers\r\nUCS Manager 3.2(3g) - (Available)\r\nCisco UCS C-Series M5 Rack Servers -Standalone\r\nCisco IMC 3.1(2i) - (Available)\r\nCisco UCS C-Series M5 Rack Servers - Managed\r\nUCS Manager 3.2(3g) - (Available)\r\n Cisco UCS C-Series M5 Rack Servers -Standalone 1 CSCvm03347 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm03347\"] Cisco UCS B-Series M5 Blade Servers\r\nUCS Manager 3.2(3g) - (Available)\r\nCisco UCS C-Series M5 Rack Servers -Standalone\r\nCisco IMC 3.1(2i) - (Available) Cisco UCS E-Series Servers CSCvm02902 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02902\"]\r\n Cisco UCS S3260 M4 Storage Server CSCvm03351 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm03351\"] Cisco UCS B-Series M4 Blade Servers (except B260\r\nB460)\r\nUCS Manager 3.2(3e) - (Available)\r\nUCS Manager 3.1(3j) - (Available)\r\nUCS Manager 2.2(8l) - (Available)\r\nCisco UCS C-Series M4 Rack Servers - Managed (except C460) - UCS Manager 3.2(3e) - (Available)\r\nCisco UCS S3260 M4 Storage Server - Managed - UCS Manager 3.2(3e) - (Available)\r\nCisco UCS S3260 M4 Storage Server - Standalone - Cisco IMC 3.0(4e) - (Available)\r\nCisco UCS S3260 M4 Storage Server - UCS Manager 3.1(3j) - (Available)\r\nCisco UCS C-Series M4 Rack Servers\r\nCisco IMC 3.0(4e) - (Available)\r\nCisco IMC 2.0(10k) - (Available)\r\nCisco UCS S3260 M4 Storage Server\r\nUCS Manager 3.2(3e) - (Available)\r\nUCS Manager 3.1(3j) - (Available)\r\nUCS Manager 2.2(8l) - (Available)\r\nCisco UCS C-Series M4 Rack Servers - Managed (except C460) - UCS Manager 3.2(3e) - (Available)\r\nCisco UCS S3260 M4 Storage Server - Managed - UCS Manager 3.2(3e) - (Available)\r\nCisco UCS S3260 M4 Storage Server - Standalone - Cisco IMC 3.0(4e) - (Available)\r\nCisco UCS S3260 M4 Storage Voice and Unified Communications Devices Cisco Remote Expert Mobile CSCvm02994 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02994\"]\r\n Video, Streaming, TelePresence, and Transcoding Devices Cisco Video Surveillance Media Server CSCvm04841 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm04841\"]\r\n Cisco Cloud Hosted Services Cisco Metacloud CSCvm02969 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02969\"]\r\n\r\n\r\n1Cisco UCS M4 and M5 Rack Servers are used as part of the Cisco HyperFlex Solution.", "title": "Vulnerable Products" }, { "category": "general", "text": "The following Cisco products are considered not vulnerable to foreshadow or other identified L1 Terminal Fault-related vulnerabilities. Specific models in these product families may be affected and will be explicitly listed in the preceding Vulnerable Products [\"#vp\"] section.\r\n Routers Branch Routers\r\nCisco 4000 Series Integrated Services Routers\r\n Cisco 1900 Series Integrated Services Routers\r\n Cisco 1800 Series Integrated Services Routers\r\n Cisco 1000 Series Integrated Services Routers\r\nCisco 2900 Series Integrated Services Routers\r\nCisco 3900 Series Integrated Services Routers\r\n Cisco 800 Series Routers\r\n\r\nData Center Interconnect Platforms\r\n\r\nCisco ASR 1000 Series Aggregation Services Routers\r\n Cisco Carrier Routing System\r\n Cisco Catalyst 6500 Series Switches\r\n\r\nIndustrial Routers\r\n\r\nCisco 2000 Series Connected Grid Routers\r\n Cisco 1000 Series Connected Grid Routers\r\n Cisco 900 Series Industrial Routers\r\n Cisco 800 Series Industrial Integrated Services Routers\r\n Cisco 500 Series WPAN Industrial Routers\r\n Cisco Wireless Gateway for LoRaWAN\r\n\r\nCloud Networking Services\r\n\r\nCisco Cloud Services Router 1000V Series\r\n\r\nMobile Internet Routers\r\n\r\nCisco 5900 Series Embedded Services Routers\r\nCisco MWR 2900 Series Mobile Wireless Routers\r\n\r\nService Provider Core Routers\r\n\r\nCisco Carrier Routing System\r\n Cisco Network Convergence System 6000 Series Routers\r\n\r\nService Provider Edge Routers\r\n\r\nCisco 12000 Series Routers\r\n Cisco ASR 1000 Series Aggregation Services Routers\r\n Cisco ASR 920 Series Aggregation Services Router\r\n Cisco ASR 901 Series Aggregation Services Routers\r\n Cisco ASR 900 Series Aggregation Services Routers\r\n Cisco XR 12000 Series Router\r\n Cisco Network Convergence System 500 Series Routers\r\n\r\nSmall Business Routers\r\n\r\nCisco 1900 Series Integrated Services Routers\r\n Cisco 800 Series Routers\r\n Cisco Small Business RV Series Routers\r\n\r\nVirtual Routers\r\n\r\nCisco Cloud Services Router 1000V Series\r\n Cisco WAN Aggregation and Internet Edge Routers\r\n Cisco ASR 1000 Series Aggregation Services Routers\r\n Cisco Catalyst 6500 Series Switches\r\n Switches\r\nBlade Switches\r\n\r\nCisco Blade Switches for Dell\r\n Cisco Blade Switches for FSC\r\n Cisco Blade Switches for HP\r\n Cisco Nexus 4000 Series Switches\r\n Cisco Switch Modules for IBM\r\n Cisco SFS Solutions for Blade Switches\r\n Cisco SFS Solution for Dell\r\n\r\nCampus LAN Switches - Access\r\n\r\n Cisco Catalyst 4500 Series Switches\r\n Cisco Catalyst 3850 Series Switches\r\n Cisco Catalyst 3750 Series Switches\r\n Cisco Catalyst 2960-L Series Switches\r\n Cisco Catalyst 2960-Plus Series Switches\r\n Cisco Catalyst 2960-X Series Switches\r\n Cisco Edge Series\r\n Cisco Meraki Cloud Managed Switches\r\n Cisco Redundant Power Systems\r\n\r\nCampus LAN Switches - Core and Distribution\r\n\r\n Cisco Catalyst 9500 Series Switches\r\nCisco Catalyst 6800 Series Switches\r\nCisco Catalyst 6500 Series Switches\r\nCisco Catalyst 6500 Virtual Switching System 1440\r\nCisco Catalyst 4900 Series Switches\r\nCisco Catalyst 4500 Series Switches\r\nCisco Catalyst 4500-X Series Switches\r\nCisco Catalyst 3850 Series Switches\r\n\r\n Campus LAN Switches - Digital Building\r\n\r\n Cisco Catalyst 3560-CX Series Switches\r\n Cisco Catalyst 2960-C Series Switches\r\n Cisco Catalyst 2960-CX Series Switches\r\n Cisco Catalyst 2960-L Series Switches\r\n Cisco Catalyst Digital Building Series Switches\r\n\r\nData Center Switches\r\n\r\n Cisco Nexus 2000 Series Fabric Extenders\r\n Cisco R Series Racks\r\n Cisco RP Series Power Distribution Units\r\n Cisco Data Center Network Management\r\n Cisco Data Center Network Manager\r\n Cisco Fabric Manager\r\nCisco MDS 9000 Series Multilayer Switches\r\n Cisco Data Center Switches with Cisco IOS Software\r\n Cisco Catalyst 6500 Series Switches\r\n Cisco Catalyst 4900 Series Switches\r\n Cisco Energy and Asset Management\r\n Cisco Asset Management Suite\r\n Cisco Energy Management Suite\r\n\r\nIndustrial Ethernet Switches\r\n\r\n Cisco 2500 Series Connected Grid Switches\r\n Cisco Embedded Service 2020 Series Switches\r\n Cisco Industrial Ethernet 5000 Series Switches\r\n Cisco Industrial Ethernet 4010 Series Switches\r\n Cisco Industrial Ethernet 4000 Series Switches\r\n Cisco Industrial Ethernet 3010 Series Switches\r\n Cisco Industrial Ethernet 3000 Series Switches\r\n Cisco Industrial Ethernet 2000 Series Switches\r\n Cisco Industrial Ethernet 2000U Series Switches\r\n Cisco Industrial Ethernet 1000 Series Switches\r\n\r\nInfiniBand Switches\r\n\r\n Cisco SFS 7000 Series InfiniBand Server Switches\r\n Cisco SFS 3500 Series Multifabric Server Switches\r\n Cisco SFS 3000 Series Multifabric Server Switches\r\n\r\n LAN Switches - Small Business\r\n\r\n Cisco 550X Series Stackable Managed Switches\r\n Cisco 350 Series Managed Switches\r\n Cisco 350X Series Stackable Managed Switches\r\n Cisco 250 Series Smart Switches\r\n Cisco 220 Series Smart Switches\r\n Cisco ESW2 Series Advanced Switches\r\n Cisco Small Business 300 Series Managed Switches\r\n Cisco Small Business 200 Series Smart Switches\r\n Cisco Small Business 110 Series Unmanaged Switches\r\n Cisco Small Business Smart Switches\r\n Cisco Small Business Stackable Managed Switches\r\n Cisco Small Business Unmanaged Switches\r\n\r\nService Provider Switches - Aggregation\r\n\r\n Cisco Catalyst 6500 Series Switches\r\n Cisco Catalyst 4500 Series Switches\r\n Cisco ME 4900 Series Ethernet Switches\r\n Cisco ME 3800X Series Carrier Ethernet Switch Routers\r\n\r\nService Provider Switches - Ethernet Access\r\n\r\n Cisco Catalyst 3750 Metro Series Switches\r\n Cisco ME 3600X Series Ethernet Access Switches\r\n Cisco ME 3400 Series Ethernet Access Switches\r\n Cisco ME 3400E Series Ethernet Access Switches\r\n Cisco ME 1200 Series Carrier Ethernet Access Devices\r\n Cisco Small Business Gigabit SP Switches\r\n\r\nVirtual Networking\r\n\r\n Cisco Application Centric Infrastructure Virtual Edge\r\n Cisco Application Virtual Switch\r\n Cisco Cloud Services Platform 2100\r\n Cisco Nexus 1000V InterCloud\r\n Cisco Nexus 1000V Switch for KVM\r\n Cisco Nexus 1000V Switch for Microsoft Hyper-V\r\n Cisco Nexus 1000V Switch for VMware vSphere\r\n\r\nCloud Networking Services\r\n\r\nCisco Prime Virtual Network Analysis Module (vNAM)\r\n Cisco Virtual Security Gateway\r\n\r\nWAN Switches\r\n\r\n Cisco IGX 8400 Series Switches\r\n\r\nMGX Switches\r\n\r\n Cisco MGX 8900 Series Switches\r\nCisco MGX 8850 Software\r\nCisco MGX 8800 Series Switches\r\nCisco MGX 8250 Software\r\nCisco MGX 8200 Series Edge Concentrators\r\n Wireless\r\nIndoor Access Points\r\n\r\nCisco Aironet 1815 Series Access Points\r\n Cisco Aironet 2800 Series Access Points\r\n Cisco Aironet 3800 Series Access Points\r\n Cisco Aironet 4800 Access Point\r\n\r\nOutdoor and Industrial Access Points\r\n\r\nCisco Aironet 1540 Series Access Points\r\n Cisco Aironet 1560 Series Access Points\r\n Cisco Aironet 1570 Series Access Points\r\n\r\nWireless LAN Controllers\r\n\r\nCisco Virtual Wireless Controller\r\nCisco Meraki Cloud Managed Access Points\r\n Security\r\nCisco Cloud-Hosted Products\r\n\r\nCisco AMP family of products and endpoint protection clients\r\nCisco Cloud Security\r\nCisco Cloudlock\r\nCisco Umbrella\r\n\r\nEmail Security\r\n\r\nCisco Content Security Management Appliance\r\nCisco Email Security\r\nCisco Email Encryption\r\nCisco Email Encryption\r\nCisco Registered Envelope Service\r\n\r\nFirewalls\r\n\r\nCisco 3000 Series Industrial Security Appliances (ISA)\r\nCisco Meraki Cloud Managed Security Appliances\r\nCisco Adaptive Security Appliances (ASA)\r\nCisco Adaptive Security Virtual Appliance (ASAv)\r\n\r\nFirewall Management\r\n\r\nCisco Adaptive Security Device Manager\r\n Cisco Firepower Device Manager\r\n Cisco Firepower Management Center\r\n Cisco Security Manager\r\n Next-Generation Firewalls (NGFW)\r\nCisco ASA 5500-X with FirePOWER Services\r\n Cisco Firepower 9000 Series\r\n Cisco Firepower 4100 Series\r\n Cisco Firepower 2100 Series\r\n\r\nNetwork Security\r\n\r\nCisco VPN Internal Service Module for ISR G2\r\n\r\nNetwork Visibility and Segmentation\r\n\r\nCisco ISE Passive Identity Connector\r\n Cisco Security Packet Analyzer\r\n Cisco Stealthwatch Cloud\r\n Cisco Stealthwatch Enterprise\r\n\r\nNext-Generation Intrusion Prevention System (NGIPS)\r\n\r\nCisco FirePOWER 8000 Series Appliances\r\n Cisco FirePOWER 7000 Series Appliances\r\n\r\nSecurity Management\r\n\r\nCisco Firepower Management Center\r\nCisco Adaptive Security Device Manager\r\nCisco Content Security Management Appliance\r\nCisco Defense Orchestrator\r\n Unified Communications\r\nCisco Business Edition 6000 - 100x80\r\nCisco Business Edition 6000\r\nCisco Jabber - 100x80\r\nCisco Jabber\r\nCisco Expressway\r\n Customer Care\r\nCisco Unified Contact Center Express\r\nCisco Unified Contact Center Enterprise\r\nCisco Finesse\r\nCisco MediaSense\r\n Conferencing\r\nCisco Meeting Server\r\nCisco Webex Meeting Center\r\n Cisco Webex Meetings Server\r\n Cisco TelePresence Management Suite\r\n Cisco TelePresence Server\r\n Cisco TelePresence Conductor\r\n Collaboration Endpoints\r\nCisco 8800 Series IP Phones\r\nCisco 7800 Series IP Phones\r\nCisco 6900 Series IP Phones\r\nCisco 3900 Series SIP Phones\r\nCisco Desktop Collaboration Experience - DX600 Series\r\nCisco DX Series\r\nCisco TelePresence SX10 Quick Set\r\nCisco TelePresence MX Series\r\nCisco TelePresence IX5000 Series\r\n Cisco Unified Computing Management Platforms\r\nCisco Intersight\r\nCisco UCS Manager\r\nCisco UCS Central\r\nCisco UCS Performance Manager\r\n IP Video\r\nCisco Access Edge\r\nCisco Cable Modem Termination Systems (CMTSs)\r\nCisco RF Switches\r\nCisco cBR Series Converged Broadband Routers\r\nCisco uBR10000 Series Universal Broadband Routers\r\nCisco uBR7225VXR Universal Broadband Routers\r\nCisco uBR7200 Series Universal Broadband Routers\r\n\r\nNo other Cisco IP video products are known to be affected.\r\n Internet of Things (IoT)\r\nCisco Jasper Control Center\r\nCisco IoT Management\r\nCisco Application Enablement\r\nCisco IoT Security\r\nCisco Kinetic\r\nCisco Extended Enterprise\r\n\r\nCisco has investigated the following products and they are not considered to be affected by the vulnerabilities that are described in this advisory:\r\n Collaboration and Social Media\r\n\r\nCisco Meeting Server\r\nNetwork Application, Service, and Acceleration\r\n\r\nCisco Tetration Analytics\r\nNetwork and Content Security Devices\r\n\r\nCisco Identity Services Engine (ISE)\r\nCisco Umbrella Virtual Appliance\r\nNetwork Management and Provisioning\r\n\r\nCisco Evolved Programmable Network Manager\r\nCisco Policy Suite\r\nCisco Prime Infrastructure\r\nRouting and Switching - Enterprise and Service Provider\r\n\r\nCisco 1000 Series Connected Grid Routers\r\nCisco 800 Series Industrial Integrated Services Routers\r\nCisco Application Policy Infrastructure Controller (APIC)\r\nCisco Catalyst 3650 Series Switches - IOx feature\r\nCisco Nexus 4000 Series Blade Switches\r\nCisco Nexus 9000 Series Fabric Switches - ACI mode\r\nCisco Virtual Application Policy Infrastructure Controller (APIC)\r\nUnified Computing\r\n\r\nCisco Common Services Platform Collector\r\nCisco UCS Director\r\nVoice and Unified Communications Devices\r\n\r\nCisco Meeting Management\r\nCisco Unified Communications Manager Session Management Edition\r\nCisco Unified Communications Manager\r\nVideo, Streaming, TelePresence, and Transcoding Devices\r\n\r\nCisco TelePresence Conductor\r\nCisco TelePresence ISDN Gateway 3241\r\nCisco TelePresence ISDN Gateway MSE 8321\r\nCisco TelePresence MCU 4200 Series, 4500 Series, 5300 Series, MSE 8420, and MSE 8510\r\nCisco TelePresence Server 7010 and MSE 8710\r\nCisco TelePresence Server on Multiparty Media 310 and 320\r\nCisco TelePresence Server on Multiparty Media 820\r\nCisco TelePresence Server on Virtual Machine\r\nCisco TelePresence Supervisor MSE 8050\r\nTandberg Codian ISDN Gateway 3210, 3220, and 3240\r\nTandberg Codian MSE 8320\r\nWireless\r\n\r\nCisco Mobility Services Engine\r\nCisco Wireless Gateway for LoRaWAN\r\nCisco Wireless LAN Controller\r\nCisco Cloud Hosted Services\r\n\r\nCisco Cloudlock\r\nCisco Hosted Collaboration Solution (HCS) for Government\r\nCisco Umbrella\r\nCisco Webex Teams (formerly Cisco Spark)", "title": "Products Confirmed Not Vulnerable" }, { "category": "general", "text": "There are no workarounds that address this vulnerability.", "title": "Workarounds" }, { "category": "general", "text": "For information about fixed software releases, consult the Cisco bug ID(s) at the top of this advisory.\r\n\r\nWhen considering software upgrades, customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.", "title": "Fixed Software" }, { "category": "general", "text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.", "title": "Vulnerability Policy" }, { "category": "general", "text": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", "title": "Exploitation and Public Announcements" }, { "category": "general", "text": "CVE ID CVE-2018-3615 was reported to Intel by Raoul Strackx, Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, and Yuval Yarom.\r\n\r\nCVE ID CVE-2018-3620 and CVE-2018-3646 were discovered by Intel during the research of foreshadow.", "title": "Source" }, { "category": "legal_disclaimer", "text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. CISCO EXPECTS TO UPDATE THIS DOCUMENT AS NEW INFORMATION BECOMES AVAILABLE.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.", "title": "Legal Disclaimer" } ], "publisher": { "category": "vendor", "contact_details": "Emergency Support:\r\n+1 877 228 7302 (toll-free within North America)\r\n+1 408 525 6532 (International direct-dial)\r\nNon-emergency Support:\r\nEmail: psirt@cisco.com\r\nSupport requests that are received via e-mail are typically acknowledged within 48 hours.", "issuing_authority": "Cisco product security incident response is the responsibility of the Cisco Product Security Incident Response Team (PSIRT). The Cisco PSIRT is a dedicated, global team that manages the receipt, investigation, and public reporting of security vulnerability information that is related to Cisco products and networks. The on-call Cisco PSIRT works 24x7 with Cisco customers, independent security researchers, consultants, industry organizations, and other vendors to identify possible security issues with Cisco products and networks.\r\nMore information can be found in Cisco Security Vulnerability Policy available at https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html", "name": "Cisco", "namespace": "https://wwww.cisco.com" }, "references": [ { "category": "self", "summary": "CPU Side-Channel Information Disclosure Vulnerabilities: August 2018", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel" }, { "category": "external", "summary": "Cisco Security Vulnerability Policy", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html" }, { "category": "external", "summary": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel" }, { "category": "external", "summary": "CSCvm02914", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02914" }, { "category": "external", "summary": "CSCvm02977", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02977" }, { "category": "external", "summary": "CSCvm02977", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02977" }, { "category": "external", "summary": "CSCvm02977", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02977" }, { "category": "external", "summary": "CSCvm02977", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02977" }, { "category": "external", "summary": "CSCvm02977", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02977" }, { "category": "external", "summary": "CSCvm02977", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02977" }, { "category": "external", "summary": "CSCvm02977", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02977" }, { "category": "external", "summary": "CSCvm02926", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02926" }, { "category": "external", "summary": "CSCvm02929", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02929" }, { "category": "external", "summary": "CSCvm02930", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02930" }, { "category": "external", "summary": "CSCvm02924", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02924" }, { "category": "external", "summary": "CSCvm02926", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02926" }, { "category": "external", "summary": "CSCvm02911", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02911" }, { "category": "external", "summary": "CSCvm02911", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02911" }, { "category": "external", "summary": "CSCvm02987", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02987" }, { "category": "external", "summary": "CSCvm02920", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02920" }, { "category": "external", "summary": "CSCvm02934", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02934" }, { "category": "external", "summary": "CSCvm03356", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm03356" }, { "category": "external", "summary": "CSCvm03351", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm03351" }, { "category": "external", "summary": "CSCvm03339", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm03339" }, { "category": "external", "summary": "CSCvm02934", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02934" }, { "category": "external", "summary": "CSCvm03356", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm03356" }, { "category": "external", "summary": "CSCvm03357", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm03357" }, { "category": "external", "summary": "CSCvm03353", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm03353" }, { "category": "external", "summary": "CSCvm03351", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm03351" }, { "category": "external", "summary": "CSCvm03339", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm03339" }, { "category": "external", "summary": "CSCvm03347", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm03347" }, { "category": "external", "summary": "CSCvm02902", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02902" }, { "category": "external", "summary": "CSCvm03351", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm03351" }, { "category": "external", "summary": "CSCvm02994", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02994" }, { "category": "external", "summary": "CSCvm04841", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm04841" }, { "category": "external", "summary": "CSCvm02969", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm02969" }, { "category": "external", "summary": "Cisco Security Advisories and Alerts page", "url": "https://www.cisco.com/go/psirt" }, { "category": "external", "summary": "Security Vulnerability Policy", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html" } ], "title": "CPU Side-Channel Information Disclosure Vulnerabilities: August 2018", "tracking": { "current_release_date": "2018-08-31T20:37:00+00:00", "generator": { "date": "2022-09-03T03:40:56+00:00", "engine": { "name": "TVCE" } }, "id": "cisco-sa-20180814-cpusidechannel", "initial_release_date": "2018-08-14T17:00:00+00:00", "revision_history": [ { "date": "2018-08-14T18:24:35+00:00", "number": "1.0.0", "summary": "Initial public release." }, { "date": "2018-08-15T20:28:21+00:00", "number": "1.1.0", "summary": "Updated Affected Products Sections: Under Investigation, Confirmed Vulnerable, and Confirmed Not Vulnerable." }, { "date": "2018-08-17T20:17:13+00:00", "number": "1.2.0", "summary": "Removed SGX reference to UCS in the Summary section, no shipping UCS products currently support SGX technology. Updated Affected Products sections: Products Under Investigation, Confirmed Vulnerable, and Confirmed Not Vulnerable." }, { "date": "2018-08-22T18:39:04+00:00", "number": "1.3.0", "summary": "Updated the Products Under Investigation, Confirmed Vulnerable, and Confirmed Not Vulnerable sections." }, { "date": "2018-08-28T19:36:37+00:00", "number": "1.4.0", "summary": "Updated the Products Under Investigation, Confirmed Vulnerable, and Confirmed Not Vulnerable sections." }, { "date": "2018-08-31T20:37:06+00:00", "number": "1.5.0", "summary": "Updated the Products Under Investigation, Confirmed Vulnerable, and Confirmed Not Vulnerable sections." } ], "status": "interim", "version": "1.5.0" } }, "vulnerabilities": [ { "cve": "CVE-2018-3615", "notes": [ { "category": "general", "text": "No additional information for this vulneraiblity is currently avaialbe.", "title": "No Notes" } ], "release_date": "2018-08-14T02:02:00+00:00", "remediations": [ { "category": "none_available", "details": "No remediation is available at this time." } ], "title": "Modern CPU L1 Terminal Fault - SGX" }, { "cve": "CVE-2018-3620", "notes": [ { "category": "general", "text": "No additional information for this vulneraiblity is currently avaialbe.", "title": "No Notes" } ], "release_date": "2018-08-14T02:08:00+00:00", "remediations": [ { "category": "none_available", "details": "No remediation is available at this time." } ], "title": "Modern CPU L1 Terminal Fault - Operating System and System Management Mode" }, { "cve": "CVE-2018-3646", "notes": [ { "category": "general", "text": "No additional information for this vulneraiblity is currently avaialbe.", "title": "No Notes" } ], "release_date": "2018-08-14T02:12:00+00:00", "remediations": [ { "category": "none_available", "details": "No remediation is available at this time." } ], "title": "Modern CPU L1 Terminal Fault - Virtual Machine Mode" } ] }
gsd-2018-3646
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2018-3646", "description": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "id": "GSD-2018-3646", "references": [ "https://www.suse.com/security/cve/CVE-2018-3646.html", "https://www.debian.org/security/2018/dsa-4279", "https://www.debian.org/security/2018/dsa-4274", "https://access.redhat.com/errata/RHSA-2018:2603", "https://access.redhat.com/errata/RHSA-2018:2602", "https://access.redhat.com/errata/RHSA-2018:2404", "https://access.redhat.com/errata/RHSA-2018:2403", "https://access.redhat.com/errata/RHSA-2018:2402", "https://access.redhat.com/errata/RHSA-2018:2396", "https://access.redhat.com/errata/RHSA-2018:2395", "https://access.redhat.com/errata/RHSA-2018:2394", "https://access.redhat.com/errata/RHSA-2018:2393", "https://access.redhat.com/errata/RHSA-2018:2392", "https://access.redhat.com/errata/RHSA-2018:2391", "https://access.redhat.com/errata/RHSA-2018:2390", "https://access.redhat.com/errata/RHSA-2018:2389", "https://access.redhat.com/errata/RHSA-2018:2388", "https://access.redhat.com/errata/RHSA-2018:2387", "https://access.redhat.com/errata/RHSA-2018:2384", "https://ubuntu.com/security/CVE-2018-3646", "https://advisories.mageia.org/CVE-2018-3646.html", "https://security.archlinux.org/CVE-2018-3646", "https://alas.aws.amazon.com/cve/html/CVE-2018-3646.html", "https://linux.oracle.com/cve/CVE-2018-3646.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-3646" ], "details": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "id": "GSD-2018-3646", "modified": "2023-12-13T01:22:43.467195Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2018-08-14T00:00:00", "ID": "CVE-2018-3646", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Multiple", "version": { "version_data": [ { "version_value": "Multiple" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "VU#982149", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/982149" }, { "name": "1041451", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041451" }, { "name": "GLSA-201810-06", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201810-06" }, { "name": "USN-3741-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3741-2/" }, { "name": "RHSA-2018:2393", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2393" }, { "name": "USN-3823-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3823-1/" }, { "name": "RHSA-2018:2389", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2389" }, { "name": "1042004", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1042004" }, { "name": "RHSA-2018:2390", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "name": "RHSA-2018:2403", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2403" }, { "name": "105080", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105080" }, { "name": "RHSA-2018:2395", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "name": "RHSA-2018:2384", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "name": "USN-3740-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3740-2/" }, { "name": "FreeBSD-SA-18:09", "refsource": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.asc" }, { "name": "DSA-4274", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4274" }, { "name": "FEDORA-2018-1c80fea1cd", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XRFKQWYV2H4BV75CUNGCGE5TNVQCLBGZ/" }, { "name": "RHSA-2018:2388", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2388" }, { "name": "USN-3741-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3741-1/" }, { "name": "RHSA-2018:2603", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2603" }, { "name": "RHSA-2018:2402", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2402" }, { "name": "20180814 CPU Side-Channel Information Disclosure Vulnerabilities: August 2018", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel" }, { "name": "FEDORA-2018-f8cba144ae", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V4UWGORQWCENCIF2BHWUEF2ODBV75QS2/" }, { "name": "USN-3742-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3742-2/" }, { "name": "RHSA-2018:2404", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2404" }, { "name": "USN-3740-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3740-1/" }, { "name": "RHSA-2018:2391", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2391" }, { "name": "RHSA-2018:2396", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2396" }, { "name": "DSA-4279", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4279" }, { "name": "RHSA-2018:2392", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2392" }, { "name": "[debian-lts-announce] 20180828 [SECURITY] [DLA 1481-1] linux-4.9 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html" }, { "name": "USN-3742-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3742-1/" }, { "name": "RHSA-2018:2602", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2602" }, { "name": "[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "name": "RHSA-2018:2394", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2394" }, { "name": "RHSA-2018:2387", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2387" }, { "name": "USN-3756-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3756-1/" }, { "name": "https://www.oracle.com/security-alerts/cpujul2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html", "refsource": "CONFIRM", "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", "refsource": "CONFIRM", "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "name": "http://xenbits.xen.org/xsa/advisory-273.html", "refsource": "CONFIRM", "url": "http://xenbits.xen.org/xsa/advisory-273.html" }, { "name": "https://foreshadowattack.eu/", "refsource": "MISC", "url": "https://foreshadowattack.eu/" }, { "name": "https://security.netapp.com/advisory/ntap-20180815-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180815-0001/" }, { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018", "refsource": "CONFIRM", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018" }, { "name": "http://support.lenovo.com/us/en/solutions/LEN-24163", "refsource": "CONFIRM", "url": "http://support.lenovo.com/us/en/solutions/LEN-24163" }, { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html" }, { "name": "https://www.synology.com/support/security/Synology_SA_18_45", "refsource": "CONFIRM", "url": "https://www.synology.com/support/security/Synology_SA_18_45" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03874en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03874en_us" }, { "name": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "refsource": "CONFIRM", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0010", "refsource": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0010" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2018-0020.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2018-0020.html" }, { "name": "https://support.f5.com/csp/article/K31300402", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K31300402" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:xeon:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2018-3646" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html" }, { "name": "USN-3742-2", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3742-2/" }, { "name": "USN-3742-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3742-1/" }, { "name": "USN-3741-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3741-1/" }, { "name": "USN-3740-2", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3740-2/" }, { "name": "USN-3740-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3740-1/" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03874en_us", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03874en_us" }, { "name": "FreeBSD-SA-18:09", "refsource": "FREEBSD", "tags": [ "Third Party Advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.asc" }, { "name": "RHSA-2018:2396", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2396" }, { "name": "RHSA-2018:2395", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "name": "RHSA-2018:2394", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2394" }, { "name": "RHSA-2018:2393", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2393" }, { "name": "RHSA-2018:2392", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2392" }, { "name": "RHSA-2018:2391", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2391" }, { "name": "RHSA-2018:2390", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "name": "RHSA-2018:2389", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2389" }, { "name": "RHSA-2018:2388", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2388" }, { "name": "RHSA-2018:2387", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2387" }, { "name": "RHSA-2018:2384", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "name": "1041451", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041451" }, { "name": "105080", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105080" }, { "name": "https://www.synology.com/support/security/Synology_SA_18_45", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/support/security/Synology_SA_18_45" }, { "name": "20180814 CPU Side-Channel Information Disclosure Vulnerabilities: August 2018", "refsource": "CISCO", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel" }, { "name": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "refsource": "CONFIRM", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "name": "https://foreshadowattack.eu/", "refsource": "MISC", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://foreshadowattack.eu/" }, { "name": "http://support.lenovo.com/us/en/solutions/LEN-24163", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://support.lenovo.com/us/en/solutions/LEN-24163" }, { "name": "https://security.netapp.com/advisory/ntap-20180815-0001/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180815-0001/" }, { "name": "RHSA-2018:2404", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2404" }, { "name": "RHSA-2018:2403", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2403" }, { "name": "RHSA-2018:2402", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2402" }, { "name": "https://support.f5.com/csp/article/K31300402", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K31300402" }, { "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0010", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0010" }, { "name": "FEDORA-2018-1c80fea1cd", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XRFKQWYV2H4BV75CUNGCGE5TNVQCLBGZ/" }, { "name": "FEDORA-2018-f8cba144ae", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V4UWGORQWCENCIF2BHWUEF2ODBV75QS2/" }, { "name": "http://xenbits.xen.org/xsa/advisory-273.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://xenbits.xen.org/xsa/advisory-273.html" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2018-0020.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2018-0020.html" }, { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en" }, { "name": "VU#982149", "refsource": "CERT-VN", "tags": [], "url": "https://www.kb.cert.org/vuls/id/982149" }, { "name": "DSA-4274", "refsource": "DEBIAN", "tags": [], "url": "https://www.debian.org/security/2018/dsa-4274" }, { "name": "DSA-4279", "refsource": "DEBIAN", "tags": [], "url": "https://www.debian.org/security/2018/dsa-4279" }, { "name": "USN-3741-2", "refsource": "UBUNTU", "tags": [], "url": "https://usn.ubuntu.com/3741-2/" }, { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018", "refsource": "CONFIRM", "tags": [], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018" }, { "name": "USN-3756-1", "refsource": "UBUNTU", "tags": [], "url": "https://usn.ubuntu.com/3756-1/" }, { "name": "[debian-lts-announce] 20180828 [SECURITY] [DLA 1481-1] linux-4.9 security update", "refsource": "MLIST", "tags": [], "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html" }, { "name": "RHSA-2018:2603", "refsource": "REDHAT", "tags": [], "url": "https://access.redhat.com/errata/RHSA-2018:2603" }, { "name": "RHSA-2018:2602", "refsource": "REDHAT", "tags": [], "url": "https://access.redhat.com/errata/RHSA-2018:2602" }, { "name": "[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update", "refsource": "MLIST", "tags": [], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf", "refsource": "CONFIRM", "tags": [], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf" }, { "name": "GLSA-201810-06", "refsource": "GENTOO", "tags": [], "url": "https://security.gentoo.org/glsa/201810-06" }, { "name": "1042004", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1042004" }, { "name": "USN-3823-1", "refsource": "UBUNTU", "tags": [], "url": "https://usn.ubuntu.com/3823-1/" }, { "name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", "refsource": "CONFIRM", "tags": [], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html", "refsource": "CONFIRM", "tags": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "refsource": "MISC", "tags": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf", "refsource": "CONFIRM", "tags": [], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "name": "https://www.oracle.com/security-alerts/cpujul2020.html", "refsource": "MISC", "tags": [], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.1, "impactScore": 4.0 } }, "lastModifiedDate": "2020-08-24T17:37Z", "publishedDate": "2018-08-14T19:29Z" } } }
opensuse-su-2024:11520-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
xen-4.15.1_01-1.2 on GA media
Notes
Title of the patch
xen-4.15.1_01-1.2 on GA media
Description of the patch
These are all security issues fixed in the xen-4.15.1_01-1.2 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11520
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "xen-4.15.1_01-1.2 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the xen-4.15.1_01-1.2 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11520", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11520-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2007-1320 page", "url": "https://www.suse.com/security/cve/CVE-2007-1320/" }, { "category": "self", "summary": "SUSE CVE CVE-2007-1366 page", "url": "https://www.suse.com/security/cve/CVE-2007-1366/" }, { "category": "self", "summary": "SUSE CVE CVE-2007-3919 page", "url": "https://www.suse.com/security/cve/CVE-2007-3919/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10013 page", "url": "https://www.suse.com/security/cve/CVE-2016-10013/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10024 page", "url": "https://www.suse.com/security/cve/CVE-2016-10024/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10025 page", "url": "https://www.suse.com/security/cve/CVE-2016-10025/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7777 page", "url": "https://www.suse.com/security/cve/CVE-2016-7777/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7908 page", "url": "https://www.suse.com/security/cve/CVE-2016-7908/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7909 page", "url": "https://www.suse.com/security/cve/CVE-2016-7909/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8667 page", "url": "https://www.suse.com/security/cve/CVE-2016-8667/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8669 page", "url": "https://www.suse.com/security/cve/CVE-2016-8669/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8910 page", "url": "https://www.suse.com/security/cve/CVE-2016-8910/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9377 page", "url": "https://www.suse.com/security/cve/CVE-2016-9377/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9379 page", "url": "https://www.suse.com/security/cve/CVE-2016-9379/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9381 page", "url": "https://www.suse.com/security/cve/CVE-2016-9381/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9382 page", "url": "https://www.suse.com/security/cve/CVE-2016-9382/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9383 page", "url": "https://www.suse.com/security/cve/CVE-2016-9383/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9384 page", "url": "https://www.suse.com/security/cve/CVE-2016-9384/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9385 page", "url": "https://www.suse.com/security/cve/CVE-2016-9385/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9386 page", "url": "https://www.suse.com/security/cve/CVE-2016-9386/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9637 page", "url": "https://www.suse.com/security/cve/CVE-2016-9637/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9921 page", "url": "https://www.suse.com/security/cve/CVE-2016-9921/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9932 page", "url": "https://www.suse.com/security/cve/CVE-2016-9932/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-12135 page", "url": "https://www.suse.com/security/cve/CVE-2017-12135/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-12136 page", "url": "https://www.suse.com/security/cve/CVE-2017-12136/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-12137 page", "url": "https://www.suse.com/security/cve/CVE-2017-12137/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2615 page", "url": "https://www.suse.com/security/cve/CVE-2017-2615/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2620 page", "url": "https://www.suse.com/security/cve/CVE-2017-2620/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5753 page", "url": "https://www.suse.com/security/cve/CVE-2017-5753/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6505 page", "url": "https://www.suse.com/security/cve/CVE-2017-6505/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8309 page", "url": "https://www.suse.com/security/cve/CVE-2017-8309/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9330 page", "url": "https://www.suse.com/security/cve/CVE-2017-9330/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10471 page", "url": "https://www.suse.com/security/cve/CVE-2018-10471/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10472 page", "url": "https://www.suse.com/security/cve/CVE-2018-10472/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10981 page", "url": "https://www.suse.com/security/cve/CVE-2018-10981/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10982 page", "url": "https://www.suse.com/security/cve/CVE-2018-10982/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12126 page", "url": "https://www.suse.com/security/cve/CVE-2018-12126/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12891 page", "url": "https://www.suse.com/security/cve/CVE-2018-12891/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12892 page", "url": "https://www.suse.com/security/cve/CVE-2018-12892/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12893 page", "url": "https://www.suse.com/security/cve/CVE-2018-12893/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15468 page", "url": "https://www.suse.com/security/cve/CVE-2018-15468/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15469 page", "url": "https://www.suse.com/security/cve/CVE-2018-15469/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15470 page", "url": "https://www.suse.com/security/cve/CVE-2018-15470/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18883 page", "url": "https://www.suse.com/security/cve/CVE-2018-18883/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19961 page", "url": "https://www.suse.com/security/cve/CVE-2018-19961/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19963 page", "url": "https://www.suse.com/security/cve/CVE-2018-19963/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19964 page", "url": "https://www.suse.com/security/cve/CVE-2018-19964/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19965 page", "url": "https://www.suse.com/security/cve/CVE-2018-19965/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19966 page", "url": "https://www.suse.com/security/cve/CVE-2018-19966/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19967 page", "url": "https://www.suse.com/security/cve/CVE-2018-19967/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3639 page", "url": "https://www.suse.com/security/cve/CVE-2018-3639/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3665 page", "url": "https://www.suse.com/security/cve/CVE-2018-3665/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5244 page", "url": "https://www.suse.com/security/cve/CVE-2018-5244/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7540 page", "url": "https://www.suse.com/security/cve/CVE-2018-7540/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7541 page", "url": "https://www.suse.com/security/cve/CVE-2018-7541/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7542 page", "url": "https://www.suse.com/security/cve/CVE-2018-7542/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17349 page", "url": "https://www.suse.com/security/cve/CVE-2019-17349/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11739 page", "url": "https://www.suse.com/security/cve/CVE-2020-11739/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11740 page", "url": "https://www.suse.com/security/cve/CVE-2020-11740/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11742 page", "url": "https://www.suse.com/security/cve/CVE-2020-11742/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11743 page", "url": "https://www.suse.com/security/cve/CVE-2020-11743/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15563 page", "url": "https://www.suse.com/security/cve/CVE-2020-15563/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15565 page", "url": "https://www.suse.com/security/cve/CVE-2020-15565/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15566 page", "url": "https://www.suse.com/security/cve/CVE-2020-15566/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15567 page", "url": "https://www.suse.com/security/cve/CVE-2020-15567/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25595 page", "url": "https://www.suse.com/security/cve/CVE-2020-25595/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25596 page", "url": "https://www.suse.com/security/cve/CVE-2020-25596/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25597 page", "url": "https://www.suse.com/security/cve/CVE-2020-25597/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25598 page", "url": "https://www.suse.com/security/cve/CVE-2020-25598/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25599 page", "url": "https://www.suse.com/security/cve/CVE-2020-25599/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25600 page", "url": "https://www.suse.com/security/cve/CVE-2020-25600/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25601 page", "url": "https://www.suse.com/security/cve/CVE-2020-25601/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25602 page", "url": "https://www.suse.com/security/cve/CVE-2020-25602/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25603 page", "url": "https://www.suse.com/security/cve/CVE-2020-25603/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25604 page", "url": "https://www.suse.com/security/cve/CVE-2020-25604/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27670 page", "url": "https://www.suse.com/security/cve/CVE-2020-27670/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27671 page", "url": "https://www.suse.com/security/cve/CVE-2020-27671/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27672 page", "url": "https://www.suse.com/security/cve/CVE-2020-27672/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27674 page", "url": "https://www.suse.com/security/cve/CVE-2020-27674/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28368 page", "url": "https://www.suse.com/security/cve/CVE-2020-28368/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29040 page", "url": "https://www.suse.com/security/cve/CVE-2020-29040/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29480 page", "url": "https://www.suse.com/security/cve/CVE-2020-29480/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29481 page", "url": "https://www.suse.com/security/cve/CVE-2020-29481/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29483 page", "url": "https://www.suse.com/security/cve/CVE-2020-29483/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29484 page", "url": "https://www.suse.com/security/cve/CVE-2020-29484/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29566 page", "url": "https://www.suse.com/security/cve/CVE-2020-29566/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29567 page", "url": "https://www.suse.com/security/cve/CVE-2020-29567/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29570 page", "url": "https://www.suse.com/security/cve/CVE-2020-29570/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29571 page", "url": "https://www.suse.com/security/cve/CVE-2020-29571/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-28687 page", "url": "https://www.suse.com/security/cve/CVE-2021-28687/" } ], "title": "xen-4.15.1_01-1.2 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11520-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.15.1_01-1.2.aarch64", "product": { "name": "xen-4.15.1_01-1.2.aarch64", "product_id": "xen-4.15.1_01-1.2.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.15.1_01-1.2.aarch64", "product": { "name": "xen-devel-4.15.1_01-1.2.aarch64", "product_id": "xen-devel-4.15.1_01-1.2.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.15.1_01-1.2.aarch64", "product": { "name": "xen-doc-html-4.15.1_01-1.2.aarch64", "product_id": "xen-doc-html-4.15.1_01-1.2.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.15.1_01-1.2.aarch64", "product": { "name": "xen-libs-4.15.1_01-1.2.aarch64", "product_id": "xen-libs-4.15.1_01-1.2.aarch64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.15.1_01-1.2.aarch64", "product": { "name": "xen-libs-32bit-4.15.1_01-1.2.aarch64", "product_id": "xen-libs-32bit-4.15.1_01-1.2.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.15.1_01-1.2.aarch64", "product": { "name": "xen-tools-4.15.1_01-1.2.aarch64", "product_id": "xen-tools-4.15.1_01-1.2.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.15.1_01-1.2.aarch64", "product": { "name": "xen-tools-domU-4.15.1_01-1.2.aarch64", "product_id": "xen-tools-domU-4.15.1_01-1.2.aarch64" } }, { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "product": { "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "product_id": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-4.15.1_01-1.2.ppc64le", "product": { "name": "xen-4.15.1_01-1.2.ppc64le", "product_id": "xen-4.15.1_01-1.2.ppc64le" } }, { "category": "product_version", "name": "xen-devel-4.15.1_01-1.2.ppc64le", "product": { "name": "xen-devel-4.15.1_01-1.2.ppc64le", "product_id": "xen-devel-4.15.1_01-1.2.ppc64le" } }, { "category": "product_version", "name": "xen-doc-html-4.15.1_01-1.2.ppc64le", "product": { "name": "xen-doc-html-4.15.1_01-1.2.ppc64le", "product_id": "xen-doc-html-4.15.1_01-1.2.ppc64le" } }, { "category": "product_version", "name": "xen-libs-4.15.1_01-1.2.ppc64le", "product": { "name": "xen-libs-4.15.1_01-1.2.ppc64le", "product_id": "xen-libs-4.15.1_01-1.2.ppc64le" } }, { "category": "product_version", "name": "xen-libs-32bit-4.15.1_01-1.2.ppc64le", "product": { "name": "xen-libs-32bit-4.15.1_01-1.2.ppc64le", "product_id": "xen-libs-32bit-4.15.1_01-1.2.ppc64le" } }, { "category": "product_version", "name": "xen-tools-4.15.1_01-1.2.ppc64le", "product": { "name": "xen-tools-4.15.1_01-1.2.ppc64le", "product_id": "xen-tools-4.15.1_01-1.2.ppc64le" } }, { "category": "product_version", "name": "xen-tools-domU-4.15.1_01-1.2.ppc64le", "product": { "name": "xen-tools-domU-4.15.1_01-1.2.ppc64le", "product_id": "xen-tools-domU-4.15.1_01-1.2.ppc64le" } }, { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "product": { "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "product_id": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "xen-4.15.1_01-1.2.s390x", "product": { "name": "xen-4.15.1_01-1.2.s390x", "product_id": "xen-4.15.1_01-1.2.s390x" } }, { "category": "product_version", "name": "xen-devel-4.15.1_01-1.2.s390x", "product": { "name": "xen-devel-4.15.1_01-1.2.s390x", "product_id": "xen-devel-4.15.1_01-1.2.s390x" } }, { "category": "product_version", "name": "xen-doc-html-4.15.1_01-1.2.s390x", "product": { "name": "xen-doc-html-4.15.1_01-1.2.s390x", "product_id": "xen-doc-html-4.15.1_01-1.2.s390x" } }, { "category": "product_version", "name": "xen-libs-4.15.1_01-1.2.s390x", "product": { "name": "xen-libs-4.15.1_01-1.2.s390x", "product_id": "xen-libs-4.15.1_01-1.2.s390x" } }, { "category": "product_version", "name": "xen-libs-32bit-4.15.1_01-1.2.s390x", "product": { "name": "xen-libs-32bit-4.15.1_01-1.2.s390x", "product_id": "xen-libs-32bit-4.15.1_01-1.2.s390x" } }, { "category": "product_version", "name": "xen-tools-4.15.1_01-1.2.s390x", "product": { "name": "xen-tools-4.15.1_01-1.2.s390x", "product_id": "xen-tools-4.15.1_01-1.2.s390x" } }, { "category": "product_version", "name": "xen-tools-domU-4.15.1_01-1.2.s390x", "product": { "name": "xen-tools-domU-4.15.1_01-1.2.s390x", "product_id": "xen-tools-domU-4.15.1_01-1.2.s390x" } }, { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "product": { "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "product_id": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "xen-4.15.1_01-1.2.x86_64", "product": { "name": "xen-4.15.1_01-1.2.x86_64", "product_id": "xen-4.15.1_01-1.2.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.15.1_01-1.2.x86_64", "product": { "name": "xen-devel-4.15.1_01-1.2.x86_64", "product_id": "xen-devel-4.15.1_01-1.2.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.15.1_01-1.2.x86_64", "product": { "name": "xen-doc-html-4.15.1_01-1.2.x86_64", "product_id": "xen-doc-html-4.15.1_01-1.2.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.15.1_01-1.2.x86_64", "product": { "name": "xen-libs-4.15.1_01-1.2.x86_64", "product_id": "xen-libs-4.15.1_01-1.2.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.15.1_01-1.2.x86_64", "product": { "name": "xen-libs-32bit-4.15.1_01-1.2.x86_64", "product_id": "xen-libs-32bit-4.15.1_01-1.2.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.15.1_01-1.2.x86_64", "product": { "name": "xen-tools-4.15.1_01-1.2.x86_64", "product_id": "xen-tools-4.15.1_01-1.2.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.15.1_01-1.2.x86_64", "product": { "name": "xen-tools-domU-4.15.1_01-1.2.x86_64", "product_id": "xen-tools-domU-4.15.1_01-1.2.x86_64" } }, { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64", "product": { "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64", "product_id": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.15.1_01-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64" }, "product_reference": "xen-4.15.1_01-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.15.1_01-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le" }, "product_reference": "xen-4.15.1_01-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.15.1_01-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x" }, "product_reference": "xen-4.15.1_01-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.15.1_01-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64" }, "product_reference": "xen-4.15.1_01-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.15.1_01-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64" }, "product_reference": "xen-devel-4.15.1_01-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.15.1_01-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le" }, "product_reference": "xen-devel-4.15.1_01-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.15.1_01-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x" }, "product_reference": "xen-devel-4.15.1_01-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.15.1_01-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64" }, "product_reference": "xen-devel-4.15.1_01-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.15.1_01-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64" }, "product_reference": "xen-doc-html-4.15.1_01-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.15.1_01-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le" }, "product_reference": "xen-doc-html-4.15.1_01-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.15.1_01-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x" }, "product_reference": "xen-doc-html-4.15.1_01-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.15.1_01-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64" }, "product_reference": "xen-doc-html-4.15.1_01-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.15.1_01-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64" }, "product_reference": "xen-libs-4.15.1_01-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.15.1_01-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le" }, "product_reference": "xen-libs-4.15.1_01-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.15.1_01-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x" }, "product_reference": "xen-libs-4.15.1_01-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.15.1_01-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64" }, "product_reference": "xen-libs-4.15.1_01-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.15.1_01-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64" }, "product_reference": "xen-libs-32bit-4.15.1_01-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.15.1_01-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le" }, "product_reference": "xen-libs-32bit-4.15.1_01-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.15.1_01-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x" }, "product_reference": "xen-libs-32bit-4.15.1_01-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.15.1_01-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64" }, "product_reference": "xen-libs-32bit-4.15.1_01-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.15.1_01-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64" }, "product_reference": "xen-tools-4.15.1_01-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.15.1_01-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le" }, "product_reference": "xen-tools-4.15.1_01-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.15.1_01-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x" }, "product_reference": "xen-tools-4.15.1_01-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.15.1_01-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64" }, "product_reference": "xen-tools-4.15.1_01-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.15.1_01-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64" }, "product_reference": "xen-tools-domU-4.15.1_01-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.15.1_01-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le" }, "product_reference": "xen-tools-domU-4.15.1_01-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.15.1_01-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x" }, "product_reference": "xen-tools-domU-4.15.1_01-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.15.1_01-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64" }, "product_reference": "xen-tools-domU-4.15.1_01-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64" }, "product_reference": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le" }, "product_reference": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x" }, "product_reference": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" }, "product_reference": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-1320", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2007-1320" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the cirrus_invalidate_region function in the Cirrus VGA extension in QEMU 0.8.2, as used in Xen and possibly other products, might allow local users to execute arbitrary code via unspecified vectors related to \"attempting to mark non-existent regions as dirty,\" aka the \"bitblt\" heap overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2007-1320", "url": "https://www.suse.com/security/cve/CVE-2007-1320" }, { "category": "external", "summary": "SUSE Bug 252519 for CVE-2007-1320", "url": "https://bugzilla.suse.com/252519" }, { "category": "external", "summary": "SUSE Bug 270621 for CVE-2007-1320", "url": "https://bugzilla.suse.com/270621" }, { "category": "external", "summary": "SUSE Bug 435135 for CVE-2007-1320", "url": "https://bugzilla.suse.com/435135" }, { "category": "external", "summary": "SUSE Bug 448551 for CVE-2007-1320", "url": "https://bugzilla.suse.com/448551" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2007-1320" }, { "cve": "CVE-2007-1366", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2007-1366" } ], "notes": [ { "category": "general", "text": "QEMU 0.8.2 allows local users to crash a virtual machine via the divisor operand to the aam instruction, as demonstrated by \"aam 0x0,\" which triggers a divide-by-zero error.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2007-1366", "url": "https://www.suse.com/security/cve/CVE-2007-1366" }, { "category": "external", "summary": "SUSE Bug 252519 for CVE-2007-1366", "url": "https://bugzilla.suse.com/252519" }, { "category": "external", "summary": "SUSE Bug 270621 for CVE-2007-1366", "url": "https://bugzilla.suse.com/270621" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2007-1366" }, { "cve": "CVE-2007-3919", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2007-3919" } ], "notes": [ { "category": "general", "text": "(1) xenbaked and (2) xenmon.py in Xen 3.1 and earlier allow local users to truncate arbitrary files via a symlink attack on /tmp/xenq-shm.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2007-3919", "url": "https://www.suse.com/security/cve/CVE-2007-3919" }, { "category": "external", "summary": "SUSE Bug 334445 for CVE-2007-3919", "url": "https://bugzilla.suse.com/334445" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2007-3919" }, { "cve": "CVE-2016-10013", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10013" } ], "notes": [ { "category": "general", "text": "Xen through 4.8.x allows local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10013", "url": "https://www.suse.com/security/cve/CVE-2016-10013" }, { "category": "external", "summary": "SUSE Bug 1016340 for CVE-2016-10013", "url": "https://bugzilla.suse.com/1016340" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-10013" }, { "cve": "CVE-2016-10024", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10024" } ], "notes": [ { "category": "general", "text": "Xen through 4.8.x allows local x86 PV guest OS kernel administrators to cause a denial of service (host hang or crash) by modifying the instruction stream asynchronously while performing certain kernel operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10024", "url": "https://www.suse.com/security/cve/CVE-2016-10024" }, { "category": "external", "summary": "SUSE Bug 1014298 for CVE-2016-10024", "url": "https://bugzilla.suse.com/1014298" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2016-10024", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-10024" }, { "cve": "CVE-2016-10025", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10025" } ], "notes": [ { "category": "general", "text": "VMFUNC emulation in Xen 4.6.x through 4.8.x on x86 systems using AMD virtualization extensions (aka SVM) allows local HVM guest OS users to cause a denial of service (hypervisor crash) by leveraging a missing NULL pointer check.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10025", "url": "https://www.suse.com/security/cve/CVE-2016-10025" }, { "category": "external", "summary": "SUSE Bug 1014300 for CVE-2016-10025", "url": "https://bugzilla.suse.com/1014300" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-10025" }, { "cve": "CVE-2016-7777", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7777" } ], "notes": [ { "category": "general", "text": "Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7777", "url": "https://www.suse.com/security/cve/CVE-2016-7777" }, { "category": "external", "summary": "SUSE Bug 1000106 for CVE-2016-7777", "url": "https://bugzilla.suse.com/1000106" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-7777" }, { "cve": "CVE-2016-7908", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7908" } ], "notes": [ { "category": "general", "text": "The mcf_fec_do_tx function in hw/net/mcf_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7908", "url": "https://www.suse.com/security/cve/CVE-2016-7908" }, { "category": "external", "summary": "SUSE Bug 1002550 for CVE-2016-7908", "url": "https://bugzilla.suse.com/1002550" }, { "category": "external", "summary": "SUSE Bug 1003030 for CVE-2016-7908", "url": "https://bugzilla.suse.com/1003030" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-7908" }, { "cve": "CVE-2016-7909", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7909" } ], "notes": [ { "category": "general", "text": "The pcnet_rdra_addr function in hw/net/pcnet.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7909", "url": "https://www.suse.com/security/cve/CVE-2016-7909" }, { "category": "external", "summary": "SUSE Bug 1002557 for CVE-2016-7909", "url": "https://bugzilla.suse.com/1002557" }, { "category": "external", "summary": "SUSE Bug 1003032 for CVE-2016-7909", "url": "https://bugzilla.suse.com/1003032" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-7909" }, { "cve": "CVE-2016-8667", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8667" } ], "notes": [ { "category": "general", "text": "The rc4030_write function in hw/dma/rc4030.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8667", "url": "https://www.suse.com/security/cve/CVE-2016-8667" }, { "category": "external", "summary": "SUSE Bug 1004702 for CVE-2016-8667", "url": "https://bugzilla.suse.com/1004702" }, { "category": "external", "summary": "SUSE Bug 1005004 for CVE-2016-8667", "url": "https://bugzilla.suse.com/1005004" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-8667" }, { "cve": "CVE-2016-8669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8669" } ], "notes": [ { "category": "general", "text": "The serial_update_parameters function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8669", "url": "https://www.suse.com/security/cve/CVE-2016-8669" }, { "category": "external", "summary": "SUSE Bug 1004707 for CVE-2016-8669", "url": "https://bugzilla.suse.com/1004707" }, { "category": "external", "summary": "SUSE Bug 1005005 for CVE-2016-8669", "url": "https://bugzilla.suse.com/1005005" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-8669" }, { "cve": "CVE-2016-8910", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8910" } ], "notes": [ { "category": "general", "text": "The rtl8139_cplus_transmit function in hw/net/rtl8139.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8910", "url": "https://www.suse.com/security/cve/CVE-2016-8910" }, { "category": "external", "summary": "SUSE Bug 1006538 for CVE-2016-8910", "url": "https://bugzilla.suse.com/1006538" }, { "category": "external", "summary": "SUSE Bug 1007157 for CVE-2016-8910", "url": "https://bugzilla.suse.com/1007157" }, { "category": "external", "summary": "SUSE Bug 1024178 for CVE-2016-8910", "url": "https://bugzilla.suse.com/1024178" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-8910" }, { "cve": "CVE-2016-9377", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9377" } ], "notes": [ { "category": "general", "text": "Xen 4.5.x through 4.7.x on AMD systems without the NRip feature, when emulating instructions that generate software interrupts, allows local HVM guest OS users to cause a denial of service (guest crash) by leveraging IDT entry miscalculation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9377", "url": "https://www.suse.com/security/cve/CVE-2016-9377" }, { "category": "external", "summary": "SUSE Bug 1009108 for CVE-2016-9377", "url": "https://bugzilla.suse.com/1009108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9377" }, { "cve": "CVE-2016-9379", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9379" } ], "notes": [ { "category": "general", "text": "The pygrub boot loader emulator in Xen, when S-expression output format is requested, allows local pygrub-using guest OS administrators to read or delete arbitrary files on the host via string quotes and S-expressions in the bootloader configuration file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9379", "url": "https://www.suse.com/security/cve/CVE-2016-9379" }, { "category": "external", "summary": "SUSE Bug 1009111 for CVE-2016-9379", "url": "https://bugzilla.suse.com/1009111" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.9, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9379" }, { "cve": "CVE-2016-9381", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9381" } ], "notes": [ { "category": "general", "text": "Race condition in QEMU in Xen allows local x86 HVM guest OS administrators to gain privileges by changing certain data on shared rings, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9381", "url": "https://www.suse.com/security/cve/CVE-2016-9381" }, { "category": "external", "summary": "SUSE Bug 1009109 for CVE-2016-9381", "url": "https://bugzilla.suse.com/1009109" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-9381" }, { "cve": "CVE-2016-9382", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9382" } ], "notes": [ { "category": "general", "text": "Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9382", "url": "https://www.suse.com/security/cve/CVE-2016-9382" }, { "category": "external", "summary": "SUSE Bug 1009103 for CVE-2016-9382", "url": "https://bugzilla.suse.com/1009103" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9382" }, { "cve": "CVE-2016-9383", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9383" } ], "notes": [ { "category": "general", "text": "Xen, when running on a 64-bit hypervisor, allows local x86 guest OS users to modify arbitrary memory and consequently obtain sensitive information, cause a denial of service (host crash), or execute arbitrary code on the host by leveraging broken emulation of bit test instructions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9383", "url": "https://www.suse.com/security/cve/CVE-2016-9383" }, { "category": "external", "summary": "SUSE Bug 1009107 for CVE-2016-9383", "url": "https://bugzilla.suse.com/1009107" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9383" }, { "cve": "CVE-2016-9384", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9384" } ], "notes": [ { "category": "general", "text": "Xen 4.7 allows local guest OS users to obtain sensitive host information by loading a 32-bit ELF symbol table.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9384", "url": "https://www.suse.com/security/cve/CVE-2016-9384" }, { "category": "external", "summary": "SUSE Bug 1009105 for CVE-2016-9384", "url": "https://bugzilla.suse.com/1009105" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-9384" }, { "cve": "CVE-2016-9385", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9385" } ], "notes": [ { "category": "general", "text": "The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9385", "url": "https://www.suse.com/security/cve/CVE-2016-9385" }, { "category": "external", "summary": "SUSE Bug 1009104 for CVE-2016-9385", "url": "https://bugzilla.suse.com/1009104" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9385" }, { "cve": "CVE-2016-9386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9386" } ], "notes": [ { "category": "general", "text": "The x86 emulator in Xen does not properly treat x86 NULL segments as unusable when accessing memory, which might allow local HVM guest users to gain privileges via vectors involving \"unexpected\" base/limit values.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9386", "url": "https://www.suse.com/security/cve/CVE-2016-9386" }, { "category": "external", "summary": "SUSE Bug 1009100 for CVE-2016-9386", "url": "https://bugzilla.suse.com/1009100" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9386" }, { "cve": "CVE-2016-9637", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9637" } ], "notes": [ { "category": "general", "text": "The (1) ioport_read and (2) ioport_write functions in Xen, when qemu is used as a device model within Xen, might allow local x86 HVM guest OS administrators to gain qemu process privileges via vectors involving an out-of-range ioport access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9637", "url": "https://www.suse.com/security/cve/CVE-2016-9637" }, { "category": "external", "summary": "SUSE Bug 1011652 for CVE-2016-9637", "url": "https://bugzilla.suse.com/1011652" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9637" }, { "cve": "CVE-2016-9921", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9921" } ], "notes": [ { "category": "general", "text": "Quick emulator (Qemu) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to a divide by zero issue. It could occur while copying VGA data when cirrus graphics mode was set to be VGA. A privileged user inside guest could use this flaw to crash the Qemu process instance on the host, resulting in DoS.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9921", "url": "https://www.suse.com/security/cve/CVE-2016-9921" }, { "category": "external", "summary": "SUSE Bug 1014702 for CVE-2016-9921", "url": "https://bugzilla.suse.com/1014702" }, { "category": "external", "summary": "SUSE Bug 1015169 for CVE-2016-9921", "url": "https://bugzilla.suse.com/1015169" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2016-9921", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-9921" }, { "cve": "CVE-2016-9932", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9932" } ], "notes": [ { "category": "general", "text": "CMPXCHG8B emulation in Xen 3.3.x through 4.7.x on x86 systems allows local HVM guest OS users to obtain sensitive information from host stack memory via a \"supposedly-ignored\" operand size prefix.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9932", "url": "https://www.suse.com/security/cve/CVE-2016-9932" }, { "category": "external", "summary": "SUSE Bug 1012651 for CVE-2016-9932", "url": "https://bugzilla.suse.com/1012651" }, { "category": "external", "summary": "SUSE Bug 1016340 for CVE-2016-9932", "url": "https://bugzilla.suse.com/1016340" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-9932" }, { "cve": "CVE-2017-12135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-12135" } ], "notes": [ { "category": "general", "text": "Xen allows local OS guest users to cause a denial of service (crash) or possibly obtain sensitive information or gain privileges via vectors involving transitive grants.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-12135", "url": "https://www.suse.com/security/cve/CVE-2017-12135" }, { "category": "external", "summary": "SUSE Bug 1051787 for CVE-2017-12135", "url": "https://bugzilla.suse.com/1051787" }, { "category": "external", "summary": "SUSE Bug 1169392 for CVE-2017-12135", "url": "https://bugzilla.suse.com/1169392" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-12135", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-12135" }, { "cve": "CVE-2017-12136", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-12136" } ], "notes": [ { "category": "general", "text": "Race condition in the grant table code in Xen 4.6.x through 4.9.x allows local guest OS administrators to cause a denial of service (free list corruption and host crash) or gain privileges on the host via vectors involving maptrack free list handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-12136", "url": "https://www.suse.com/security/cve/CVE-2017-12136" }, { "category": "external", "summary": "SUSE Bug 1051789 for CVE-2017-12136", "url": "https://bugzilla.suse.com/1051789" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-12136" }, { "cve": "CVE-2017-12137", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-12137" } ], "notes": [ { "category": "general", "text": "arch/x86/mm.c in Xen allows local PV guest OS users to gain host OS privileges via vectors related to map_grant_ref.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-12137", "url": "https://www.suse.com/security/cve/CVE-2017-12137" }, { "category": "external", "summary": "SUSE Bug 1051788 for CVE-2017-12137", "url": "https://bugzilla.suse.com/1051788" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-12137", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-12137" }, { "cve": "CVE-2017-2615", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2615" } ], "notes": [ { "category": "general", "text": "Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the QEMU process resulting in DoS or potentially execute arbitrary code on the host with privileges of QEMU process on the host.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2615", "url": "https://www.suse.com/security/cve/CVE-2017-2615" }, { "category": "external", "summary": "SUSE Bug 1023004 for CVE-2017-2615", "url": "https://bugzilla.suse.com/1023004" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-2615", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-2615" }, { "cve": "CVE-2017-2620", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2620" } ], "notes": [ { "category": "general", "text": "Quick emulator (QEMU) before 2.8 built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2620", "url": "https://www.suse.com/security/cve/CVE-2017-2620" }, { "category": "external", "summary": "SUSE Bug 1024834 for CVE-2017-2620", "url": "https://bugzilla.suse.com/1024834" }, { "category": "external", "summary": "SUSE Bug 1024972 for CVE-2017-2620", "url": "https://bugzilla.suse.com/1024972" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-2620", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-2620" }, { "cve": "CVE-2017-5753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5753" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5753", "url": "https://www.suse.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1075748 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075748" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087084 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087084" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1209547 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1209547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5753" }, { "cve": "CVE-2017-6505", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6505" } ], "notes": [ { "category": "general", "text": "The ohci_service_ed_list function in hw/usb/hcd-ohci.c in QEMU (aka Quick Emulator) before 2.9.0 allows local guest OS users to cause a denial of service (infinite loop) via vectors involving the number of link endpoint list descriptors, a different vulnerability than CVE-2017-9330.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6505", "url": "https://www.suse.com/security/cve/CVE-2017-6505" }, { "category": "external", "summary": "SUSE Bug 1028184 for CVE-2017-6505", "url": "https://bugzilla.suse.com/1028184" }, { "category": "external", "summary": "SUSE Bug 1028235 for CVE-2017-6505", "url": "https://bugzilla.suse.com/1028235" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-6505", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2017-6505" }, { "cve": "CVE-2017-8309", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8309" } ], "notes": [ { "category": "general", "text": "Memory leak in the audio/audio.c in QEMU (aka Quick Emulator) allows remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8309", "url": "https://www.suse.com/security/cve/CVE-2017-8309" }, { "category": "external", "summary": "SUSE Bug 1037242 for CVE-2017-8309", "url": "https://bugzilla.suse.com/1037242" }, { "category": "external", "summary": "SUSE Bug 1037243 for CVE-2017-8309", "url": "https://bugzilla.suse.com/1037243" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-8309", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2017-8309" }, { "cve": "CVE-2017-9330", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9330" } ], "notes": [ { "category": "general", "text": "QEMU (aka Quick Emulator) before 2.9.0, when built with the USB OHCI Emulation support, allows local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value, a different vulnerability than CVE-2017-6505.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9330", "url": "https://www.suse.com/security/cve/CVE-2017-9330" }, { "category": "external", "summary": "SUSE Bug 1042159 for CVE-2017-9330", "url": "https://bugzilla.suse.com/1042159" }, { "category": "external", "summary": "SUSE Bug 1042160 for CVE-2017-9330", "url": "https://bugzilla.suse.com/1042160" }, { "category": "external", "summary": "SUSE Bug 1043157 for CVE-2017-9330", "url": "https://bugzilla.suse.com/1043157" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-9330", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2017-9330" }, { "cve": "CVE-2018-10471", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10471" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS users to cause a denial of service (out-of-bounds zero write and hypervisor crash) via unexpected INT 80 processing, because of an incorrect fix for CVE-2017-5754.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10471", "url": "https://www.suse.com/security/cve/CVE-2018-10471" }, { "category": "external", "summary": "SUSE Bug 1089635 for CVE-2018-10471", "url": "https://bugzilla.suse.com/1089635" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-10471", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10471" }, { "cve": "CVE-2018-10472", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10472" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users (in certain configurations) to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction with specifying the target file as the backing file of a snapshot.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10472", "url": "https://www.suse.com/security/cve/CVE-2018-10472" }, { "category": "external", "summary": "SUSE Bug 1089152 for CVE-2018-10472", "url": "https://bugzilla.suse.com/1089152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10472" }, { "cve": "CVE-2018-10981", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10981" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (host OS infinite loop) in situations where a QEMU device model attempts to make invalid transitions between states of a request.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10981", "url": "https://www.suse.com/security/cve/CVE-2018-10981" }, { "category": "external", "summary": "SUSE Bug 1090823 for CVE-2018-10981", "url": "https://bugzilla.suse.com/1090823" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-10981", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10981" }, { "cve": "CVE-2018-10982", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10982" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (unexpectedly high interrupt number, array overrun, and hypervisor crash) or possibly gain hypervisor privileges by setting up an HPET timer to deliver interrupts in IO-APIC mode, aka vHPET interrupt injection.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10982", "url": "https://www.suse.com/security/cve/CVE-2018-10982" }, { "category": "external", "summary": "SUSE Bug 1090822 for CVE-2018-10982", "url": "https://bugzilla.suse.com/1090822" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-10982", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-10982" }, { "cve": "CVE-2018-12126", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12126" } ], "notes": [ { "category": "general", "text": "Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12126", "url": "https://www.suse.com/security/cve/CVE-2018-12126" }, { "category": "external", "summary": "SUSE Bug 1103186 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1103186" }, { "category": "external", "summary": "SUSE Bug 1111331 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1111331" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1135409 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1135409" }, { "category": "external", "summary": "SUSE Bug 1135524 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1135524" }, { "category": "external", "summary": "SUSE Bug 1137916 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1137916" }, { "category": "external", "summary": "SUSE Bug 1138534 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1138534" }, { "category": "external", "summary": "SUSE Bug 1141977 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1141977" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 1149726 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1149726" }, { "category": "external", "summary": "SUSE Bug 1149729 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1149729" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-12126" }, { "cve": "CVE-2018-12891", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12891" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x. Certain PV MMU operations may take a long time to process. For that reason Xen explicitly checks for the need to preempt the current vCPU at certain points. A few rarely taken code paths did bypass such checks. By suitably enforcing the conditions through its own page table contents, a malicious guest may cause such bypasses to be used for an unbounded number of iterations. A malicious or buggy PV guest may cause a Denial of Service (DoS) affecting the entire host. Specifically, it may prevent use of a physical CPU for an indeterminate period of time. All Xen versions from 3.4 onwards are vulnerable. Xen versions 3.3 and earlier are vulnerable to an even wider class of attacks, due to them lacking preemption checks altogether in the affected code paths. Only x86 systems are affected. ARM systems are not affected. Only multi-vCPU x86 PV guests can leverage the vulnerability. x86 HVM or PVH guests as well as x86 single-vCPU PV ones cannot leverage the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12891", "url": "https://www.suse.com/security/cve/CVE-2018-12891" }, { "category": "external", "summary": "SUSE Bug 1097521 for CVE-2018-12891", "url": "https://bugzilla.suse.com/1097521" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12891", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-12891" }, { "cve": "CVE-2018-12892", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12892" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen 4.7 through 4.10.x. libxl fails to pass the readonly flag to qemu when setting up a SCSI disk, due to what was probably an erroneous merge conflict resolution. Malicious guest administrators or (in some situations) users may be able to write to supposedly read-only disk images. Only emulated SCSI disks (specified as \"sd\" in the libxl disk configuration, or an equivalent) are affected. IDE disks (\"hd\") are not affected (because attempts to make them readonly are rejected). Additionally, CDROM devices (that is, devices specified to be presented to the guest as CDROMs, regardless of the nature of the backing storage on the host) are not affected; they are always read only. Only systems using qemu-xen (rather than qemu-xen-traditional) as the device model version are vulnerable. Only systems using libxl or libxl-based toolstacks are vulnerable. (This includes xl, and libvirt with the libxl driver.) The vulnerability is present in Xen versions 4.7 and later. (In earlier versions, provided that the patch for XSA-142 has been applied, attempts to create read only disks are rejected.) If the host and guest together usually support PVHVM, the issue is exploitable only if the malicious guest administrator has control of the guest kernel or guest kernel command line.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12892", "url": "https://www.suse.com/security/cve/CVE-2018-12892" }, { "category": "external", "summary": "SUSE Bug 1097523 for CVE-2018-12892", "url": "https://bugzilla.suse.com/1097523" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-12892" }, { "cve": "CVE-2018-12893", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12893" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x. One of the fixes in XSA-260 added some safety checks to help prevent Xen livelocking with debug exceptions. Unfortunately, due to an oversight, at least one of these safety checks can be triggered by a guest. A malicious PV guest can crash Xen, leading to a Denial of Service. All Xen systems which have applied the XSA-260 fix are vulnerable. Only x86 systems are vulnerable. ARM systems are not vulnerable. Only x86 PV guests can exploit the vulnerability. x86 HVM and PVH guests cannot exploit the vulnerability. An attacker needs to be able to control hardware debugging facilities to exploit the vulnerability, but such permissions are typically available to unprivileged users.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12893", "url": "https://www.suse.com/security/cve/CVE-2018-12893" }, { "category": "external", "summary": "SUSE Bug 1097522 for CVE-2018-12893", "url": "https://bugzilla.suse.com/1097522" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12893", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-12893" }, { "cve": "CVE-2018-15468", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15468" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) can lock up the entire host, causing a Denial of Service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15468", "url": "https://www.suse.com/security/cve/CVE-2018-15468" }, { "category": "external", "summary": "SUSE Bug 1103276 for CVE-2018-15468", "url": "https://bugzilla.suse.com/1103276" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-15468" }, { "cve": "CVE-2018-15469", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15469" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.11.x. ARM never properly implemented grant table v2, either in the hypervisor or in Linux. Unfortunately, an ARM guest can still request v2 grant tables; they will simply not be properly set up, resulting in subsequent grant-related hypercalls hitting BUG() checks. An unprivileged guest can cause a BUG() check in the hypervisor, resulting in a denial-of-service (crash).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15469", "url": "https://www.suse.com/security/cve/CVE-2018-15469" }, { "category": "external", "summary": "SUSE Bug 1103275 for CVE-2018-15469", "url": "https://bugzilla.suse.com/1103275" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-15469" }, { "cve": "CVE-2018-15470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15470" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.11.x. The logic in oxenstored for handling writes depended on the order of evaluation of expressions making up a tuple. As indicated in section 7.7.3 \"Operations on data structures\" of the OCaml manual, the order of evaluation of subexpressions is not specified. In practice, different implementations behave differently. Thus, oxenstored may not enforce the configured quota-maxentity. This allows a malicious or buggy guest to write as many xenstore entries as it wishes, causing unbounded memory usage in oxenstored. This can lead to a system-wide DoS.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15470", "url": "https://www.suse.com/security/cve/CVE-2018-15470" }, { "category": "external", "summary": "SUSE Bug 1103279 for CVE-2018-15470", "url": "https://bugzilla.suse.com/1103279" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-15470" }, { "cve": "CVE-2018-18883", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-18883" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen 4.9.x through 4.11.x, on Intel x86 platforms, allowing x86 HVM and PVH guests to cause a host OS denial of service (NULL pointer dereference) or possibly have unspecified other impact because nested VT-x is not properly restricted.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-18883", "url": "https://www.suse.com/security/cve/CVE-2018-18883" }, { "category": "external", "summary": "SUSE Bug 1114405 for CVE-2018-18883", "url": "https://bugzilla.suse.com/1114405" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-18883" }, { "cve": "CVE-2018-19961", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19961" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because TLB flushes do not always occur after IOMMU mapping changes.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19961", "url": "https://www.suse.com/security/cve/CVE-2018-19961" }, { "category": "external", "summary": "SUSE Bug 1115040 for CVE-2018-19961", "url": "https://bugzilla.suse.com/1115040" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-19961", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-19961" }, { "cve": "CVE-2018-19963", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19963" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen 4.11 allowing HVM guest OS users to cause a denial of service (host OS crash) or possibly gain host OS privileges because x86 IOREQ server resource accounting (for external emulators) was mishandled.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19963", "url": "https://www.suse.com/security/cve/CVE-2018-19963" }, { "category": "external", "summary": "SUSE Bug 1115043 for CVE-2018-19963", "url": "https://bugzilla.suse.com/1115043" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-19963" }, { "cve": "CVE-2018-19964", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19964" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen 4.11.x allowing x86 guest OS users to cause a denial of service (host OS hang) because the p2m lock remains unavailable indefinitely in certain error conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19964", "url": "https://www.suse.com/security/cve/CVE-2018-19964" }, { "category": "external", "summary": "SUSE Bug 1115044 for CVE-2018-19964", "url": "https://bugzilla.suse.com/1115044" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-19964" }, { "cve": "CVE-2018-19965", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19965" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-5754 (aka Meltdown) mitigation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19965", "url": "https://www.suse.com/security/cve/CVE-2018-19965" }, { "category": "external", "summary": "SUSE Bug 1115045 for CVE-2018-19965", "url": "https://bugzilla.suse.com/1115045" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-19965" }, { "cve": "CVE-2018-19966", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19966" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service (host OS crash) or possibly gain host OS privileges because of an interpretation conflict for a union data structure associated with shadow paging. NOTE: this issue exists because of an incorrect fix for CVE-2017-15595.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19966", "url": "https://www.suse.com/security/cve/CVE-2018-19966" }, { "category": "external", "summary": "SUSE Bug 1115047 for CVE-2018-19966", "url": "https://bugzilla.suse.com/1115047" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-19966", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-19966" }, { "cve": "CVE-2018-19967", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19967" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.11.x on Intel x86 platforms allowing guest OS users to cause a denial of service (host OS hang) because Xen does not work around Intel\u0027s mishandling of certain HLE transactions associated with the KACQUIRE instruction prefix.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19967", "url": "https://www.suse.com/security/cve/CVE-2018-19967" }, { "category": "external", "summary": "SUSE Bug 1114988 for CVE-2018-19967", "url": "https://bugzilla.suse.com/1114988" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-19967", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-19967" }, { "cve": "CVE-2018-3639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3639" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3639", "url": "https://www.suse.com/security/cve/CVE-2018-3639" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1085235 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085235" }, { "category": "external", "summary": "SUSE Bug 1085308 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085308" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092631 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092631" }, { "category": "external", "summary": "SUSE Bug 1092885 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092885" }, { "category": "external", "summary": "SUSE Bug 1094912 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1094912" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100394 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1100394" }, { "category": "external", "summary": "SUSE Bug 1102640 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1102640" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1105412" }, { "category": "external", "summary": "SUSE Bug 1111963 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1111963" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172781" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172782" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172783" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3639" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-3646" }, { "cve": "CVE-2018-3665", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3665" } ], "notes": [ { "category": "general", "text": "System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3665", "url": "https://www.suse.com/security/cve/CVE-2018-3665" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1087086 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1087086" }, { "category": "external", "summary": "SUSE Bug 1090338 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1090338" }, { "category": "external", "summary": "SUSE Bug 1095241 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1095241" }, { "category": "external", "summary": "SUSE Bug 1095242 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1095242" }, { "category": "external", "summary": "SUSE Bug 1096740 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1096740" }, { "category": "external", "summary": "SUSE Bug 1100091 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1100091" }, { "category": "external", "summary": "SUSE Bug 1100555 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1100555" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3665" }, { "cve": "CVE-2018-5244", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5244" } ], "notes": [ { "category": "general", "text": "In Xen 4.10, new infrastructure was introduced as part of an overhaul to how MSR emulation happens for guests. Unfortunately, one tracking structure isn\u0027t freed when a vcpu is destroyed. This allows guest OS administrators to cause a denial of service (host OS memory consumption) by rebooting many times.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5244", "url": "https://www.suse.com/security/cve/CVE-2018-5244" }, { "category": "external", "summary": "SUSE Bug 1073961 for CVE-2018-5244", "url": "https://bugzilla.suse.com/1073961" }, { "category": "external", "summary": "SUSE Bug 1074966 for CVE-2018-5244", "url": "https://bugzilla.suse.com/1074966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-5244" }, { "cve": "CVE-2018-7540", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7540" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS users to cause a denial of service (host OS CPU hang) via non-preemptable L3/L4 pagetable freeing.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7540", "url": "https://www.suse.com/security/cve/CVE-2018-7540" }, { "category": "external", "summary": "SUSE Bug 1080635 for CVE-2018-7540", "url": "https://bugzilla.suse.com/1080635" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-7540", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-7540" }, { "cve": "CVE-2018-7541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7541" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing guest OS users to cause a denial of service (hypervisor crash) or gain privileges by triggering a grant-table transition from v2 to v1.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7541", "url": "https://www.suse.com/security/cve/CVE-2018-7541" }, { "category": "external", "summary": "SUSE Bug 1080662 for CVE-2018-7541", "url": "https://bugzilla.suse.com/1080662" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-7541", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-7541" }, { "cve": "CVE-2018-7542", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7542" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen 4.8.x through 4.10.x allowing x86 PVH guest OS users to cause a denial of service (NULL pointer dereference and hypervisor crash) by leveraging the mishandling of configurations that lack a Local APIC.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7542", "url": "https://www.suse.com/security/cve/CVE-2018-7542" }, { "category": "external", "summary": "SUSE Bug 1080634 for CVE-2018-7542", "url": "https://bugzilla.suse.com/1080634" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-7542" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-8897" }, { "cve": "CVE-2019-17349", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17349" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.12.x allowing Arm domU attackers to cause a denial of service (infinite loop) involving a LoadExcl or StoreExcl operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17349", "url": "https://www.suse.com/security/cve/CVE-2019-17349" }, { "category": "external", "summary": "SUSE Bug 1138294 for CVE-2019-17349", "url": "https://bugzilla.suse.com/1138294" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-17349" }, { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-11739", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11739" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service or possibly gain privileges because of missing memory barriers in read-write unlock paths. The read-write unlock paths don\u0027t contain a memory barrier. On Arm, this means a processor is allowed to re-order the memory access with the preceding ones. In other words, the unlock may be seen by another processor before all the memory accesses within the \"critical\" section. As a consequence, it may be possible to have a writer executing a critical section at the same time as readers or another writer. In other words, many of the assumptions (e.g., a variable cannot be modified after a check) in the critical sections are not safe anymore. The read-write locks are used in hypercalls (such as grant-table ones), so a malicious guest could exploit the race. For instance, there is a small window where Xen can leak memory if XENMAPSPACE_grant_table is used concurrently. A malicious guest may be able to leak memory, or cause a hypervisor crash resulting in a Denial of Service (DoS). Information leak and privilege escalation cannot be excluded.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11739", "url": "https://www.suse.com/security/cve/CVE-2020-11739" }, { "category": "external", "summary": "SUSE Bug 1168142 for CVE-2020-11739", "url": "https://bugzilla.suse.com/1168142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-11739" }, { "cve": "CVE-2020-11740", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11740" } ], "notes": [ { "category": "general", "text": "An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (without active profiling) to obtain sensitive information about other guests. Unprivileged guests can request to map xenoprof buffers, even if profiling has not been enabled for those guests. These buffers were not scrubbed.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11740", "url": "https://www.suse.com/security/cve/CVE-2020-11740" }, { "category": "external", "summary": "SUSE Bug 1168140 for CVE-2020-11740", "url": "https://bugzilla.suse.com/1168140" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-11740", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-11740" }, { "cve": "CVE-2020-11742", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11742" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of bad continuation handling in GNTTABOP_copy. Grant table operations are expected to return 0 for success, and a negative number for errors. The fix for CVE-2017-12135 introduced a path through grant copy handling where success may be returned to the caller without any action taken. In particular, the status fields of individual operations are left uninitialised, and may result in errant behaviour in the caller of GNTTABOP_copy. A buggy or malicious guest can construct its grant table in such a way that, when a backend domain tries to copy a grant, it hits the incorrect exit path. This returns success to the caller without doing anything, which may cause crashes or other incorrect behaviour.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11742", "url": "https://www.suse.com/security/cve/CVE-2020-11742" }, { "category": "external", "summary": "SUSE Bug 1169392 for CVE-2020-11742", "url": "https://bugzilla.suse.com/1169392" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-11742", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-11742" }, { "cve": "CVE-2020-11743", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11743" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of a bad error path in GNTTABOP_map_grant. Grant table operations are expected to return 0 for success, and a negative number for errors. Some misplaced brackets cause one error path to return 1 instead of a negative value. The grant table code in Linux treats this condition as success, and proceeds with incorrectly initialised state. A buggy or malicious guest can construct its grant table in such a way that, when a backend domain tries to map a grant, it hits the incorrect error path. This will crash a Linux based dom0 or backend domain.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11743", "url": "https://www.suse.com/security/cve/CVE-2020-11743" }, { "category": "external", "summary": "SUSE Bug 1168143 for CVE-2020-11743", "url": "https://bugzilla.suse.com/1168143" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-11743" }, { "cve": "CVE-2020-15563", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15563" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing x86 HVM guest OS users to cause a hypervisor crash. An inverted conditional in x86 HVM guests\u0027 dirty video RAM tracking code allows such guests to make Xen de-reference a pointer guaranteed to point at unmapped space. A malicious or buggy HVM guest may cause the hypervisor to crash, resulting in Denial of Service (DoS) affecting the entire host. Xen versions from 4.8 onwards are affected. Xen versions 4.7 and earlier are not affected. Only x86 systems are affected. Arm systems are not affected. Only x86 HVM guests using shadow paging can leverage the vulnerability. In addition, there needs to be an entity actively monitoring a guest\u0027s video frame buffer (typically for display purposes) in order for such a guest to be able to leverage the vulnerability. x86 PV guests, as well as x86 HVM guests using hardware assisted paging (HAP), cannot leverage the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15563", "url": "https://www.suse.com/security/cve/CVE-2020-15563" }, { "category": "external", "summary": "SUSE Bug 1173377 for CVE-2020-15563", "url": "https://bugzilla.suse.com/1173377" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-15563" }, { "cve": "CVE-2020-15565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15565" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing x86 Intel HVM guest OS users to cause a host OS denial of service or possibly gain privileges because of insufficient cache write-back under VT-d. When page tables are shared between IOMMU and CPU, changes to them require flushing of both TLBs. Furthermore, IOMMUs may be non-coherent, and hence prior to flushing IOMMU TLBs, a CPU cache also needs writing back to memory after changes were made. Such writing back of cached data was missing in particular when splitting large page mappings into smaller granularity ones. A malicious guest may be able to retain read/write DMA access to frames returned to Xen\u0027s free pool, and later reused for another purpose. Host crashes (leading to a Denial of Service) and privilege escalation cannot be ruled out. Xen versions from at least 3.2 onwards are affected. Only x86 Intel systems are affected. x86 AMD as well as Arm systems are not affected. Only x86 HVM guests using hardware assisted paging (HAP), having a passed through PCI device assigned, and having page table sharing enabled can leverage the vulnerability. Note that page table sharing will be enabled (by default) only if Xen considers IOMMU and CPU large page size support compatible.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15565", "url": "https://www.suse.com/security/cve/CVE-2020-15565" }, { "category": "external", "summary": "SUSE Bug 1173378 for CVE-2020-15565", "url": "https://bugzilla.suse.com/1173378" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.9, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-15565" }, { "cve": "CVE-2020-15566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15566" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a host OS crash because of incorrect error handling in event-channel port allocation. The allocation of an event-channel port may fail for multiple reasons: (1) port is already in use, (2) the memory allocation failed, or (3) the port we try to allocate is higher than what is supported by the ABI (e.g., 2L or FIFO) used by the guest or the limit set by an administrator (max_event_channels in xl cfg). Due to the missing error checks, only (1) will be considered an error. All the other cases will provide a valid port and will result in a crash when trying to access the event channel. When the administrator configured a guest to allow more than 1023 event channels, that guest may be able to crash the host. When Xen is out-of-memory, allocation of new event channels will result in crashing the host rather than reporting an error. Xen versions 4.10 and later are affected. All architectures are affected. The default configuration, when guests are created with xl/libxl, is not vulnerable, because of the default event-channel limit.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15566", "url": "https://www.suse.com/security/cve/CVE-2020-15566" }, { "category": "external", "summary": "SUSE Bug 1173376 for CVE-2020-15566", "url": "https://bugzilla.suse.com/1173376" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-15566" }, { "cve": "CVE-2020-15567", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15567" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing Intel guest OS users to gain privileges or cause a denial of service because of non-atomic modification of a live EPT PTE. When mapping guest EPT (nested paging) tables, Xen would in some circumstances use a series of non-atomic bitfield writes. Depending on the compiler version and optimisation flags, Xen might expose a dangerous partially written PTE to the hardware, which an attacker might be able to race to exploit. A guest administrator or perhaps even an unprivileged guest user might be able to cause denial of service, data corruption, or privilege escalation. Only systems using Intel CPUs are vulnerable. Systems using AMD CPUs, and Arm systems, are not vulnerable. Only systems using nested paging (hap, aka nested paging, aka in this case Intel EPT) are vulnerable. Only HVM and PVH guests can exploit the vulnerability. The presence and scope of the vulnerability depends on the precise optimisations performed by the compiler used to build Xen. If the compiler generates (a) a single 64-bit write, or (b) a series of read-modify-write operations in the same order as the source code, the hypervisor is not vulnerable. For example, in one test build using GCC 8.3 with normal settings, the compiler generated multiple (unlocked) read-modify-write operations in source-code order, which did not constitute a vulnerability. We have not been able to survey compilers; consequently we cannot say which compiler(s) might produce vulnerable code (with which code-generation options). The source code clearly violates the C rules, and thus should be considered vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15567", "url": "https://www.suse.com/security/cve/CVE-2020-15567" }, { "category": "external", "summary": "SUSE Bug 1173380 for CVE-2020-15567", "url": "https://bugzilla.suse.com/1173380" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-15567", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-15567" }, { "cve": "CVE-2020-25595", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25595" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. The PCI passthrough code improperly uses register data. Code paths in Xen\u0027s MSI handling have been identified that act on unsanitized values read back from device hardware registers. While devices strictly compliant with PCI specifications shouldn\u0027t be able to affect these registers, experience shows that it\u0027s very common for devices to have out-of-spec \"backdoor\" operations that can affect the result of these reads. A not fully trusted guest may be able to crash Xen, leading to a Denial of Service (DoS) for the entire system. Privilege escalation and information leaks cannot be excluded. All versions of Xen supporting PCI passthrough are affected. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only guests with passed through PCI devices may be able to leverage the vulnerability. Only systems passing through devices with out-of-spec (\"backdoor\") functionality can cause issues. Experience shows that such out-of-spec functionality is common; unless you have reason to believe that your device does not have such functionality, it\u0027s better to assume that it does.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25595", "url": "https://www.suse.com/security/cve/CVE-2020-25595" }, { "category": "external", "summary": "SUSE Bug 1176344 for CVE-2020-25595", "url": "https://bugzilla.suse.com/1176344" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-25595", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-25595" }, { "cve": "CVE-2020-25596", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25596" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. x86 PV guest kernels can experience denial of service via SYSENTER. The SYSENTER instruction leaves various state sanitization activities to software. One of Xen\u0027s sanitization paths injects a #GP fault, and incorrectly delivers it twice to the guest. This causes the guest kernel to observe a kernel-privilege #GP fault (typically fatal) rather than a user-privilege #GP fault (usually converted into SIGSEGV/etc.). Malicious or buggy userspace can crash the guest kernel, resulting in a VM Denial of Service. All versions of Xen from 3.2 onwards are vulnerable. Only x86 systems are vulnerable. ARM platforms are not vulnerable. Only x86 systems that support the SYSENTER instruction in 64bit mode are vulnerable. This is believed to be Intel, Centaur, and Shanghai CPUs. AMD and Hygon CPUs are not believed to be vulnerable. Only x86 PV guests can exploit the vulnerability. x86 PVH / HVM guests cannot exploit the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25596", "url": "https://www.suse.com/security/cve/CVE-2020-25596" }, { "category": "external", "summary": "SUSE Bug 1176345 for CVE-2020-25596", "url": "https://bugzilla.suse.com/1176345" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-25596", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25596" }, { "cve": "CVE-2020-25597", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25597" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. There is mishandling of the constraint that once-valid event channels may not turn invalid. Logic in the handling of event channel operations in Xen assumes that an event channel, once valid, will not become invalid over the life time of a guest. However, operations like the resetting of all event channels may involve decreasing one of the bounds checked when determining validity. This may lead to bug checks triggering, crashing the host. An unprivileged guest may be able to crash Xen, leading to a Denial of Service (DoS) for the entire system. All Xen versions from 4.4 onwards are vulnerable. Xen versions 4.3 and earlier are not vulnerable. Only systems with untrusted guests permitted to create more than the default number of event channels are vulnerable. This number depends on the architecture and type of guest. For 32-bit x86 PV guests, this is 1023; for 64-bit x86 PV guests, and for all ARM guests, this number is 4095. Systems where untrusted guests are limited to fewer than this number are not vulnerable. Note that xl and libxl limit max_event_channels to 1023 by default, so systems using exclusively xl, libvirt+libxl, or their own toolstack based on libxl, and not explicitly setting max_event_channels, are not vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25597", "url": "https://www.suse.com/security/cve/CVE-2020-25597" }, { "category": "external", "summary": "SUSE Bug 1176346 for CVE-2020-25597", "url": "https://bugzilla.suse.com/1176346" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25597" }, { "cve": "CVE-2020-25598", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25598" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen 4.14.x. There is a missing unlock in the XENMEM_acquire_resource error path. The RCU (Read, Copy, Update) mechanism is a synchronisation primitive. A buggy error path in the XENMEM_acquire_resource exits without releasing an RCU reference, which is conceptually similar to forgetting to unlock a spinlock. A buggy or malicious HVM stubdomain can cause an RCU reference to be leaked. This causes subsequent administration operations, (e.g., CPU offline) to livelock, resulting in a host Denial of Service. The buggy codepath has been present since Xen 4.12. Xen 4.14 and later are vulnerable to the DoS. The side effects are believed to be benign on Xen 4.12 and 4.13, but patches are provided nevertheless. The vulnerability can generally only be exploited by x86 HVM VMs, as these are generally the only type of VM that have a Qemu stubdomain. x86 PV and PVH domains, as well as ARM VMs, typically don\u0027t use a stubdomain. Only VMs using HVM stubdomains can exploit the vulnerability. VMs using PV stubdomains, or with emulators running in dom0, cannot exploit the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25598", "url": "https://www.suse.com/security/cve/CVE-2020-25598" }, { "category": "external", "summary": "SUSE Bug 1176341 for CVE-2020-25598", "url": "https://bugzilla.suse.com/1176341" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25598" }, { "cve": "CVE-2020-25599", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25599" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. There are evtchn_reset() race conditions. Uses of EVTCHNOP_reset (potentially by a guest on itself) or XEN_DOMCTL_soft_reset (by itself covered by XSA-77) can lead to the violation of various internal assumptions. This may lead to out of bounds memory accesses or triggering of bug checks. In particular, x86 PV guests may be able to elevate their privilege to that of the host. Host and guest crashes are also possible, leading to a Denial of Service (DoS). Information leaks cannot be ruled out. All Xen versions from 4.5 onwards are vulnerable. Xen versions 4.4 and earlier are not vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25599", "url": "https://www.suse.com/security/cve/CVE-2020-25599" }, { "category": "external", "summary": "SUSE Bug 1176349 for CVE-2020-25599", "url": "https://bugzilla.suse.com/1176349" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-25599" }, { "cve": "CVE-2020-25600", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25600" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. Out of bounds event channels are available to 32-bit x86 domains. The so called 2-level event channel model imposes different limits on the number of usable event channels for 32-bit x86 domains vs 64-bit or Arm (either bitness) ones. 32-bit x86 domains can use only 1023 channels, due to limited space in their shared (between guest and Xen) information structure, whereas all other domains can use up to 4095 in this model. The recording of the respective limit during domain initialization, however, has occurred at a time where domains are still deemed to be 64-bit ones, prior to actually honoring respective domain properties. At the point domains get recognized as 32-bit ones, the limit didn\u0027t get updated accordingly. Due to this misbehavior in Xen, 32-bit domains (including Domain 0) servicing other domains may observe event channel allocations to succeed when they should really fail. Subsequent use of such event channels would then possibly lead to corruption of other parts of the shared info structure. An unprivileged guest may cause another domain, in particular Domain 0, to misbehave. This may lead to a Denial of Service (DoS) for the entire system. All Xen versions from 4.4 onwards are vulnerable. Xen versions 4.3 and earlier are not vulnerable. Only x86 32-bit domains servicing other domains are vulnerable. Arm systems, as well as x86 64-bit domains, are not vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25600", "url": "https://www.suse.com/security/cve/CVE-2020-25600" }, { "category": "external", "summary": "SUSE Bug 1176348 for CVE-2020-25600", "url": "https://bugzilla.suse.com/1176348" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-25600" }, { "cve": "CVE-2020-25601", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25601" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. There is a lack of preemption in evtchn_reset() / evtchn_destroy(). In particular, the FIFO event channel model allows guests to have a large number of event channels active at a time. Closing all of these (when resetting all event channels or when cleaning up after the guest) may take extended periods of time. So far, there was no arrangement for preemption at suitable intervals, allowing a CPU to spend an almost unbounded amount of time in the processing of these operations. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system. All Xen versions are vulnerable in principle. Whether versions 4.3 and older are vulnerable depends on underlying hardware characteristics.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25601", "url": "https://www.suse.com/security/cve/CVE-2020-25601" }, { "category": "external", "summary": "SUSE Bug 1176350 for CVE-2020-25601", "url": "https://bugzilla.suse.com/1176350" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25601" }, { "cve": "CVE-2020-25602", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25602" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. An x86 PV guest can trigger a host OS crash when handling guest access to MSR_MISC_ENABLE. When a guest accesses certain Model Specific Registers, Xen first reads the value from hardware to use as the basis for auditing the guest access. For the MISC_ENABLE MSR, which is an Intel specific MSR, this MSR read is performed without error handling for a #GP fault, which is the consequence of trying to read this MSR on non-Intel hardware. A buggy or malicious PV guest administrator can crash Xen, resulting in a host Denial of Service. Only x86 systems are vulnerable. ARM systems are not vulnerable. Only Xen versions 4.11 and onwards are vulnerable. 4.10 and earlier are not vulnerable. Only x86 systems that do not implement the MISC_ENABLE MSR (0x1a0) are vulnerable. AMD and Hygon systems do not implement this MSR and are vulnerable. Intel systems do implement this MSR and are not vulnerable. Other manufacturers have not been checked. Only x86 PV guests can exploit the vulnerability. x86 HVM/PVH guests cannot exploit the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25602", "url": "https://www.suse.com/security/cve/CVE-2020-25602" }, { "category": "external", "summary": "SUSE Bug 1176339 for CVE-2020-25602", "url": "https://bugzilla.suse.com/1176339" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25602" }, { "cve": "CVE-2020-25603", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25603" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. There are missing memory barriers when accessing/allocating an event channel. Event channels control structures can be accessed lockless as long as the port is considered to be valid. Such a sequence is missing an appropriate memory barrier (e.g., smp_*mb()) to prevent both the compiler and CPU from re-ordering access. A malicious guest may be able to cause a hypervisor crash resulting in a Denial of Service (DoS). Information leak and privilege escalation cannot be excluded. Systems running all versions of Xen are affected. Whether a system is vulnerable will depend on the CPU and compiler used to build Xen. For all systems, the presence and the scope of the vulnerability depend on the precise re-ordering performed by the compiler used to build Xen. We have not been able to survey compilers; consequently we cannot say which compiler(s) might produce vulnerable code (with which code generation options). GCC documentation clearly suggests that re-ordering is possible. Arm systems will also be vulnerable if the CPU is able to re-order memory access. Please consult your CPU vendor. x86 systems are only vulnerable if a compiler performs re-ordering.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25603", "url": "https://www.suse.com/security/cve/CVE-2020-25603" }, { "category": "external", "summary": "SUSE Bug 1176347 for CVE-2020-25603", "url": "https://bugzilla.suse.com/1176347" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-25603", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-25603" }, { "cve": "CVE-2020-25604", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25604" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. There is a race condition when migrating timers between x86 HVM vCPUs. When migrating timers of x86 HVM guests between its vCPUs, the locking model used allows for a second vCPU of the same guest (also operating on the timers) to release a lock that it didn\u0027t acquire. The most likely effect of the issue is a hang or crash of the hypervisor, i.e., a Denial of Service (DoS). All versions of Xen are affected. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only x86 HVM guests can leverage the vulnerability. x86 PV and PVH cannot leverage the vulnerability. Only guests with more than one vCPU can exploit the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25604", "url": "https://www.suse.com/security/cve/CVE-2020-25604" }, { "category": "external", "summary": "SUSE Bug 1176343 for CVE-2020-25604", "url": "https://bugzilla.suse.com/1176343" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-25604", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25604" }, { "cve": "CVE-2020-27670", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27670" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because an AMD IOMMU page-table entry can be half-updated.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27670", "url": "https://www.suse.com/security/cve/CVE-2020-27670" }, { "category": "external", "summary": "SUSE Bug 1177414 for CVE-2020-27670", "url": "https://bugzilla.suse.com/1177414" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-27670", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1183925 for CVE-2020-27670", "url": "https://bugzilla.suse.com/1183925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-27670" }, { "cve": "CVE-2020-27671", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27671" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x allowing x86 HVM and PVH guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because coalescing of per-page IOMMU TLB flushes is mishandled.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27671", "url": "https://www.suse.com/security/cve/CVE-2020-27671" }, { "category": "external", "summary": "SUSE Bug 1177413 for CVE-2020-27671", "url": "https://bugzilla.suse.com/1177413" }, { "category": "external", "summary": "SUSE Bug 1183925 for CVE-2020-27671", "url": "https://bugzilla.suse.com/1183925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-27671" }, { "cve": "CVE-2020-27672", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27672" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a host OS denial of service, achieve data corruption, or possibly gain privileges by exploiting a race condition that leads to a use-after-free involving 2MiB and 1GiB superpages.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27672", "url": "https://www.suse.com/security/cve/CVE-2020-27672" }, { "category": "external", "summary": "SUSE Bug 1177412 for CVE-2020-27672", "url": "https://bugzilla.suse.com/1177412" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-27672", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1183925 for CVE-2020-27672", "url": "https://bugzilla.suse.com/1183925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-27672" }, { "cve": "CVE-2020-27674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27674" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27674", "url": "https://www.suse.com/security/cve/CVE-2020-27674" }, { "category": "external", "summary": "SUSE Bug 1177409 for CVE-2020-27674", "url": "https://bugzilla.suse.com/1177409" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-27674", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-27674" }, { "cve": "CVE-2020-28368", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28368" } ], "notes": [ { "category": "general", "text": "Xen through 4.14.x allows guest OS administrators to obtain sensitive information (such as AES keys from outside the guest) via a side-channel attack on a power/energy monitoring interface, aka a \"Platypus\" attack. NOTE: there is only one logically independent fix: to change the access control for each such interface in Xen.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28368", "url": "https://www.suse.com/security/cve/CVE-2020-28368" }, { "category": "external", "summary": "SUSE Bug 1178591 for CVE-2020-28368", "url": "https://bugzilla.suse.com/1178591" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-28368", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-28368" }, { "cve": "CVE-2020-29040", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29040" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x allowing x86 HVM guest OS users to cause a denial of service (stack corruption), cause a data leak, or possibly gain privileges because of an off-by-one error. NOTE: this issue is caused by an incorrect fix for CVE-2020-27671.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29040", "url": "https://www.suse.com/security/cve/CVE-2020-29040" }, { "category": "external", "summary": "SUSE Bug 1178963 for CVE-2020-29040", "url": "https://bugzilla.suse.com/1178963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.9, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-29040" }, { "cve": "CVE-2020-29480", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29480" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. Neither xenstore implementation does any permission checks when reporting a xenstore watch event. A guest administrator can watch the root xenstored node, which will cause notifications for every created, modified, and deleted key. A guest administrator can also use the special watches, which will cause a notification every time a domain is created and destroyed. Data may include: number, type, and domids of other VMs; existence and domids of driver domains; numbers of virtual interfaces, block devices, vcpus; existence of virtual framebuffers and their backend style (e.g., existence of VNC service); Xen VM UUIDs for other domains; timing information about domain creation and device setup; and some hints at the backend provisioning of VMs and their devices. The watch events do not contain values stored in xenstore, only key names. A guest administrator can observe non-sensitive domain and device lifecycle events relating to other guests. This information allows some insight into overall system configuration (including the number and general nature of other guests), and configuration of other guests (including the number and general nature of other guests\u0027 devices). This information might be commercially interesting or might make other attacks easier. There is not believed to be exposure of sensitive data. Specifically, there is no exposure of VNC passwords, port numbers, pathnames in host and guest filesystems, cryptographic keys, or within-guest data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29480", "url": "https://www.suse.com/security/cve/CVE-2020-29480" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-29480", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1179496 for CVE-2020-29480", "url": "https://bugzilla.suse.com/1179496" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2020-29480" }, { "cve": "CVE-2020-29481", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29481" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. Access rights of Xenstore nodes are per domid. Unfortunately, existing granted access rights are not removed when a domain is being destroyed. This means that a new domain created with the same domid will inherit the access rights to Xenstore nodes from the previous domain(s) with the same domid. Because all Xenstore entries of a guest below /local/domain/\u003cdomid\u003e are being deleted by Xen tools when a guest is destroyed, only Xenstore entries of other guests still running are affected. For example, a newly created guest domain might be able to read sensitive information that had belonged to a previously existing guest domain. Both Xenstore implementations (C and Ocaml) are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29481", "url": "https://www.suse.com/security/cve/CVE-2020-29481" }, { "category": "external", "summary": "SUSE Bug 1176349 for CVE-2020-29481", "url": "https://bugzilla.suse.com/1176349" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-29481", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1179498 for CVE-2020-29481", "url": "https://bugzilla.suse.com/1179498" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-29481" }, { "cve": "CVE-2020-29483", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29483" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. Xenstored and guests communicate via a shared memory page using a specific protocol. When a guest violates this protocol, xenstored will drop the connection to that guest. Unfortunately, this is done by just removing the guest from xenstored\u0027s internal management, resulting in the same actions as if the guest had been destroyed, including sending an @releaseDomain event. @releaseDomain events do not say that the guest has been removed. All watchers of this event must look at the states of all guests to find the guest that has been removed. When an @releaseDomain is generated due to a domain xenstored protocol violation, because the guest is still running, the watchers will not react. Later, when the guest is actually destroyed, xenstored will no longer have it stored in its internal data base, so no further @releaseDomain event will be sent. This can lead to a zombie domain; memory mappings of that guest\u0027s memory will not be removed, due to the missing event. This zombie domain will be cleaned up only after another domain is destroyed, as that will trigger another @releaseDomain event. If the device model of the guest that violated the Xenstore protocol is running in a stub-domain, a use-after-free case could happen in xenstored, after having removed the guest from its internal data base, possibly resulting in a crash of xenstored. A malicious guest can block resources of the host for a period after its own death. Guests with a stub domain device model can eventually crash xenstored, resulting in a more serious denial of service (the prevention of any further domain management operations). Only the C variant of Xenstore is affected; the Ocaml variant is not affected. Only HVM guests with a stubdom device model can cause a serious DoS.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29483", "url": "https://www.suse.com/security/cve/CVE-2020-29483" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-29483", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1179502 for CVE-2020-29483", "url": "https://bugzilla.suse.com/1179502" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-29483" }, { "cve": "CVE-2020-29484", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29484" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. When a Xenstore watch fires, the xenstore client that registered the watch will receive a Xenstore message containing the path of the modified Xenstore entry that triggered the watch, and the tag that was specified when registering the watch. Any communication with xenstored is done via Xenstore messages, consisting of a message header and the payload. The payload length is limited to 4096 bytes. Any request to xenstored resulting in a response with a payload longer than 4096 bytes will result in an error. When registering a watch, the payload length limit applies to the combined length of the watched path and the specified tag. Because watches for a specific path are also triggered for all nodes below that path, the payload of a watch event message can be longer than the payload needed to register the watch. A malicious guest that registers a watch using a very large tag (i.e., with a registration operation payload length close to the 4096 byte limit) can cause the generation of watch events with a payload length larger than 4096 bytes, by writing to Xenstore entries below the watched path. This will result in an error condition in xenstored. This error can result in a NULL pointer dereference, leading to a crash of xenstored. A malicious guest administrator can cause xenstored to crash, leading to a denial of service. Following a xenstored crash, domains may continue to run, but management operations will be impossible. Only C xenstored is affected, oxenstored is not affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29484", "url": "https://www.suse.com/security/cve/CVE-2020-29484" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-29484", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1179501 for CVE-2020-29484", "url": "https://bugzilla.suse.com/1179501" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-29484" }, { "cve": "CVE-2020-29566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29566" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. When they require assistance from the device model, x86 HVM guests must be temporarily de-scheduled. The device model will signal Xen when it has completed its operation, via an event channel, so that the relevant vCPU is rescheduled. If the device model were to signal Xen without having actually completed the operation, the de-schedule / re-schedule cycle would repeat. If, in addition, Xen is resignalled very quickly, the re-schedule may occur before the de-schedule was fully complete, triggering a shortcut. This potentially repeating process uses ordinary recursive function calls, and thus could result in a stack overflow. A malicious or buggy stubdomain serving a HVM guest can cause Xen to crash, resulting in a Denial of Service (DoS) to the entire host. Only x86 systems are affected. Arm systems are not affected. Only x86 stubdomains serving HVM guests can exploit the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29566", "url": "https://www.suse.com/security/cve/CVE-2020-29566" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-29566", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1179506 for CVE-2020-29566", "url": "https://bugzilla.suse.com/1179506" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-29566" }, { "cve": "CVE-2020-29567", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29567" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen 4.14.x. When moving IRQs between CPUs to distribute the load of IRQ handling, IRQ vectors are dynamically allocated and de-allocated on the relevant CPUs. De-allocation has to happen when certain constraints are met. If these conditions are not met when first checked, the checking CPU may send an interrupt to itself, in the expectation that this IRQ will be delivered only after the condition preventing the cleanup has cleared. For two specific IRQ vectors, this expectation was violated, resulting in a continuous stream of self-interrupts, which renders the CPU effectively unusable. A domain with a passed through PCI device can cause lockup of a physical CPU, resulting in a Denial of Service (DoS) to the entire host. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only guests with physical PCI devices passed through to them can exploit the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29567", "url": "https://www.suse.com/security/cve/CVE-2020-29567" }, { "category": "external", "summary": "SUSE Bug 1179513 for CVE-2020-29567", "url": "https://bugzilla.suse.com/1179513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-29567" }, { "cve": "CVE-2020-29570", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29570" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. Recording of the per-vCPU control block mapping maintained by Xen and that of pointers into the control block is reversed. The consumer assumes, seeing the former initialized, that the latter are also ready for use. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29570", "url": "https://www.suse.com/security/cve/CVE-2020-29570" }, { "category": "external", "summary": "SUSE Bug 1179514 for CVE-2020-29570", "url": "https://bugzilla.suse.com/1179514" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-29570" }, { "cve": "CVE-2020-29571", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29571" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. A bounds check common to most operation time functions specific to FIFO event channels depends on the CPU observing consistent state. While the producer side uses appropriately ordered writes, the consumer side isn\u0027t protected against re-ordered reads, and may hence end up de-referencing a NULL pointer. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system. Only Arm systems may be vulnerable. Whether a system is vulnerable depends on the specific CPU. x86 systems are not vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29571", "url": "https://www.suse.com/security/cve/CVE-2020-29571" }, { "category": "external", "summary": "SUSE Bug 1179516 for CVE-2020-29571", "url": "https://bugzilla.suse.com/1179516" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-29571" }, { "cve": "CVE-2021-28687", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-28687" } ], "notes": [ { "category": "general", "text": "HVM soft-reset crashes toolstack libxl requires all data structures passed across its public interface to be initialized before use and disposed of afterwards by calling a specific set of functions. Many internal data structures also require this initialize / dispose discipline, but not all of them. When the \"soft reset\" feature was implemented, the libxl__domain_suspend_state structure didn\u0027t require any initialization or disposal. At some point later, an initialization function was introduced for the structure; but the \"soft reset\" path wasn\u0027t refactored to call the initialization function. When a guest nwo initiates a \"soft reboot\", uninitialized data structure leads to an assert() when later code finds the structure in an unexpected state. The effect of this is to crash the process monitoring the guest. How this affects the system depends on the structure of the toolstack. For xl, this will have no security-relevant effect: every VM has its own independent monitoring process, which contains no state. The domain in question will hang in a crashed state, but can be destroyed by `xl destroy` just like any other non-cooperating domain. For daemon-based toolstacks linked against libxl, such as libvirt, this will crash the toolstack, losing the state of any in-progress operations (localized DoS), and preventing further administrator operations unless the daemon is configured to restart automatically (system-wide DoS). If crashes \"leak\" resources, then repeated crashes could use up resources, also causing a system-wide DoS.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-28687", "url": "https://www.suse.com/security/cve/CVE-2021-28687" }, { "category": "external", "summary": "SUSE Bug 1183072 for CVE-2021-28687", "url": "https://bugzilla.suse.com/1183072" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-28687" } ] }
wid-sec-w-2025-1212
Vulnerability from csaf_certbund
Published
2019-04-16 22:00
Modified
2025-06-02 22:00
Summary
Oracle Communications Applications: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Mit der Unified Communications Suite bietet Oracle eine Messaging- und Collaboration-Plattform an.
Oracle Communications Policy Management ist ein Produkt von Oracle und vereint mehrere Bereiche der Kommunikation.
Oracle Communications Unified Inventory Management (UIM) ist eine offene, standardbasierte Anwendung, die eine Bestandsaufnahme von Kommunikationsdiensten und -ressourcen ermöglicht.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Oracle Communications Applications ausnutzen, um dadurch die Integrität, Vertraulichkeit und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- Linux
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Mit der Unified Communications Suite bietet Oracle eine Messaging- und Collaboration-Plattform an.\r\nOracle Communications Policy Management ist ein Produkt von Oracle und vereint mehrere Bereiche der Kommunikation.\r\nOracle Communications Unified Inventory Management (UIM) ist eine offene, standardbasierte Anwendung, die eine Bestandsaufnahme von Kommunikationsdiensten und -ressourcen erm\u00f6glicht.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Oracle Communications Applications ausnutzen, um dadurch die Integrit\u00e4t, Vertraulichkeit und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-1212 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2025-1212.json" }, { "category": "self", "summary": "WID-SEC-2025-1212 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1212" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - April 2019 vom 2019-04-16", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html#AppendixCGBU" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4218-1 vom 2019-12-11", "url": "https://usn.ubuntu.com/4218-1/" }, { "category": "external", "summary": "XEROX Security Advisory XRX25-012 vom 2025-06-02", "url": "https://security.business.xerox.com/wp-content/uploads/2025/06/Xerox-Security-Bulletin-XRX25-012-for-Xerox-FreeFlow-Print-Server-v9.pdf" } ], "source_lang": "en-US", "title": "Oracle Communications Applications: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-06-02T22:00:00.000+00:00", "generator": { "date": "2025-06-03T09:23:36.426+00:00", "engine": { "name": "BSI-WID", "version": "1.3.12" } }, "id": "WID-SEC-W-2025-1212", "initial_release_date": "2019-04-16T22:00:00.000+00:00", "revision_history": [ { "date": "2019-04-16T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2019-04-17T22:00:00.000+00:00", "number": "2", "summary": "Schreibfehler korrigiert" }, { "date": "2019-12-10T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-02T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von XEROX aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "10", "product": { "name": "Oracle Communications EAGLE LNP Application Processor 10.0", "product_id": "T014014", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_eagle_lnp_application_processor:10.0" } } }, { "category": "product_version", "name": "10.1", "product": { "name": "Oracle Communications EAGLE LNP Application Processor 10.1", "product_id": "T014015", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_eagle_lnp_application_processor:10.1" } } }, { "category": "product_version", "name": "10.2", "product": { "name": "Oracle Communications EAGLE LNP Application Processor 10.2", "product_id": "T014016", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_eagle_lnp_application_processor:10.2" } } } ], "category": "product_name", "name": "Communications EAGLE LNP Application Processor" }, { "branches": [ { "category": "product_version", "name": "13.1", "product": { "name": "Oracle Communications LSMS 13.1", "product_id": "T006217", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_lsms:13.1" } } }, { "category": "product_version", "name": "13.2", "product": { "name": "Oracle Communications LSMS 13.2", "product_id": "T014017", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_lsms:13.2" } } }, { "category": "product_version", "name": "13.3", "product": { "name": "Oracle Communications LSMS 13.3", "product_id": "T014018", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_lsms:13.3" } } } ], "category": "product_name", "name": "Communications LSMS" }, { "branches": [ { "category": "product_version", "name": "8.1", "product": { "name": "Oracle Communications Messaging Server 8.1", "product_id": "T014019", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_messaging_server:8.1" } } }, { "category": "product_version", "name": "8", "product": { "name": "Oracle Communications Messaging Server 8.0", "product_id": "T014020", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_messaging_server:8.0" } } } ], "category": "product_name", "name": "Communications Messaging Server" }, { "branches": [ { "category": "product_version", "name": "12.2", "product": { "name": "Oracle Communications Policy Management 12.2", "product_id": "T009732", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_policy_management:12.2" } } }, { "category": "product_version", "name": "12.1", "product": { "name": "Oracle Communications Policy Management 12.1", "product_id": "T014021", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_policy_management:12.1" } } }, { "category": "product_version", "name": "12.3", "product": { "name": "Oracle Communications Policy Management 12.3", "product_id": "T014022", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_policy_management:12.3" } } }, { "category": "product_version", "name": "12.4", "product": { "name": "Oracle Communications Policy Management 12.4", "product_id": "T014023", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_policy_management:12.4" } } } ], "category": "product_name", "name": "Communications Policy Management" }, { "branches": [ { "category": "product_version", "name": "6", "product": { "name": "Oracle Communications Service Broker 6.0", "product_id": "329193", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_service_broker:6.0" } } } ], "category": "product_name", "name": "Communications Service Broker" }, { "branches": [ { "category": "product_version", "name": "8.2.0", "product": { "name": "Oracle Communications Session Border Controller 8.2.0", "product_id": "T014024", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_session_border_controller:8.2.0" } } }, { "category": "product_version", "name": "8.1.0", "product": { "name": "Oracle Communications Session Border Controller 8.1.0", "product_id": "T014025", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_session_border_controller:8.1.0" } } }, { "category": "product_version", "name": "8.0.0", "product": { "name": "Oracle Communications Session Border Controller 8.0.0", "product_id": "T014026", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_session_border_controller:8.0.0" } } } ], "category": "product_name", "name": "Communications Session Border Controller" }, { "branches": [ { "category": "product_version", "name": "3.1.0", "product": { "name": "Oracle Enterprise Communications Broker 3.1.0", "product_id": "T014030", "product_identification_helper": { "cpe": "cpe:/a:oracle:enterprise_communications_broker:3.1.0" } } }, { "category": "product_version", "name": "3.0.0", "product": { "name": "Oracle Enterprise Communications Broker 3.0.0", "product_id": "T014031", "product_identification_helper": { "cpe": "cpe:/a:oracle:enterprise_communications_broker:3.0.0" } } } ], "category": "product_name", "name": "Enterprise Communications Broker" } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "9", "product": { "name": "Xerox FreeFlow Print Server 9", "product_id": "T002977", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:9" } } } ], "category": "product_name", "name": "FreeFlow Print Server" } ], "category": "vendor", "name": "Xerox" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "7.4.0", "product": { "name": "Oracle Communications Unified Inventory Management 7.4.0", "product_id": "T013407", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_unified_inventory_management:7.4.0" } } }, { "category": "product_version", "name": "7.3.5", "product": { "name": "Oracle Communications Unified Inventory Management 7.3.5", "product_id": "T014027", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_unified_inventory_management:7.3.5" } } }, { "category": "product_version", "name": "7.3.2", "product": { "name": "Oracle Communications Unified Inventory Management 7.3.2", "product_id": "T014028", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_unified_inventory_management:7.3.2" } } }, { "category": "product_version", "name": "7.3.4", "product": { "name": "Oracle Communications Unified Inventory Management 7.3.4", "product_id": "T014029", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_unified_inventory_management:7.3.4" } } } ], "category": "product_name", "name": "communications_unified_inventory_management" } ], "category": "vendor", "name": "oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-9251", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2015-9251" }, { "cve": "CVE-2016-1000031", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2016-1000031" }, { "cve": "CVE-2016-1181", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2016-1181" }, { "cve": "CVE-2016-1182", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2016-1182" }, { "cve": "CVE-2016-7055", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2016-7055" }, { "cve": "CVE-2016-8735", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2016-8735" }, { "cve": "CVE-2017-0861", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2017-0861" }, { "cve": "CVE-2017-12617", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2017-12617" }, { "cve": "CVE-2017-15265", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2017-15265" }, { "cve": "CVE-2017-3730", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2017-3730" }, { "cve": "CVE-2017-3731", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2017-3731" }, { "cve": "CVE-2017-3732", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2017-3732" }, { "cve": "CVE-2017-3733", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2017-3733" }, { "cve": "CVE-2017-3735", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2017-3735" }, { "cve": "CVE-2017-3736", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2017-3736" }, { "cve": "CVE-2017-3738", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2017-3738" }, { "cve": "CVE-2017-5645", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2017-5645" }, { "cve": "CVE-2017-5664", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2017-5664" }, { "cve": "CVE-2017-5753", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2017-5753" }, { "cve": "CVE-2017-5754", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2017-5754" }, { "cve": "CVE-2017-7525", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2017-7525" }, { "cve": "CVE-2018-0732", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-0732" }, { "cve": "CVE-2018-0733", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-0733" }, { "cve": "CVE-2018-0734", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-0734" }, { "cve": "CVE-2018-0737", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-0737" }, { "cve": "CVE-2018-0739", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-0739" }, { "cve": "CVE-2018-1000004", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1000180", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-1000180" }, { "cve": "CVE-2018-1000613", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-1000613" }, { "cve": "CVE-2018-10901", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-10901" }, { "cve": "CVE-2018-11039", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-11039" }, { "cve": "CVE-2018-11040", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-11040" }, { "cve": "CVE-2018-11218", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-11218" }, { "cve": "CVE-2018-11219", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-11219" }, { "cve": "CVE-2018-11236", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-11236" }, { "cve": "CVE-2018-11237", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-11237" }, { "cve": "CVE-2018-11784", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-11784" }, { "cve": "CVE-2018-12384", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-12384" }, { "cve": "CVE-2018-12404", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-12404" }, { "cve": "CVE-2018-1257", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-1257" }, { "cve": "CVE-2018-1258", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-1258" }, { "cve": "CVE-2018-16864", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-16864" }, { "cve": "CVE-2018-16865", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-16865" }, { "cve": "CVE-2018-16890", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-16890" }, { "cve": "CVE-2018-3620", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-3620" }, { "cve": "CVE-2018-3646", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-3646" }, { "cve": "CVE-2018-3693", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-3693" }, { "cve": "CVE-2018-6485", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-6485" }, { "cve": "CVE-2018-7489", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-7489" }, { "cve": "CVE-2018-7566", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2018-7566" }, { "cve": "CVE-2019-3822", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2019-3822" }, { "cve": "CVE-2019-3823", "product_status": { "known_affected": [ "T009732", "T013407", "T014018", "T014029", "T006217", "T014019", "T014016", "T014027", "T014017", "T014028", "T014014", "T014025", "T002977", "T014015", "T014026", "T014023", "T014024", "T014021", "T014022", "T014030", "T014020", "T014031", "329193", "T000126" ] }, "release_date": "2019-04-16T22:00:00.000+00:00", "title": "CVE-2019-3823" } ] }
ghsa-qj7r-58vw-6www
Vulnerability from github
Published
2022-05-13 01:20
Modified
2022-05-13 01:20
Severity ?
VLAI Severity ?
Details
Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.
{ "affected": [], "aliases": [ "CVE-2018-3646" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-08-14T19:29:00Z", "severity": "MODERATE" }, "details": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "id": "GHSA-qj7r-58vw-6www", "modified": "2022-05-13T01:20:14Z", "published": "2022-05-13T01:20:14Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "type": "WEB", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0010" }, { "type": "WEB", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.asc" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201810-06" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20180815-0001" }, { "type": "WEB", "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "type": "WEB", "url": "https://support.f5.com/csp/article/K31300402" }, { "type": "WEB", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03874en_us" }, { "type": "WEB", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3740-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3740-2" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3741-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3741-2" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3742-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3742-2" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3756-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3823-1" }, { "type": "WEB", "url": "https://www.debian.org/security/2018/dsa-4274" }, { "type": "WEB", "url": "https://www.debian.org/security/2018/dsa-4279" }, { "type": "WEB", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html" }, { "type": "WEB", "url": "https://www.kb.cert.org/vuls/id/982149" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "type": "WEB", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "type": "WEB", "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "type": "WEB", "url": "https://www.synology.com/support/security/Synology_SA_18_45" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2387" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2388" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2389" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2391" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2392" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2393" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2394" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2396" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2402" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2403" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2404" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2602" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2603" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "type": "WEB", "url": "https://foreshadowattack.eu" }, { "type": "WEB", "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V4UWGORQWCENCIF2BHWUEF2ODBV75QS2" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XRFKQWYV2H4BV75CUNGCGE5TNVQCLBGZ" }, { "type": "WEB", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018" }, { "type": "WEB", "url": "http://support.lenovo.com/us/en/solutions/LEN-24163" }, { "type": "WEB", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/105080" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1041451" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1042004" }, { "type": "WEB", "url": "http://www.vmware.com/security/advisories/VMSA-2018-0020.html" }, { "type": "WEB", "url": "http://xenbits.xen.org/xsa/advisory-273.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "type": "CVSS_V3" } ] }
fkie_cve-2018-3646
Vulnerability from fkie_nvd
Published
2018-08-14 19:29
Modified
2024-11-21 04:05
Severity ?
Summary
Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.
References
▶ | URL | Tags | |
---|---|---|---|
secure@intel.com | http://support.lenovo.com/us/en/solutions/LEN-24163 | Third Party Advisory | |
secure@intel.com | http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en | Third Party Advisory | |
secure@intel.com | http://www.securityfocus.com/bid/105080 | Third Party Advisory, VDB Entry | |
secure@intel.com | http://www.securitytracker.com/id/1041451 | Third Party Advisory, VDB Entry | |
secure@intel.com | http://www.securitytracker.com/id/1042004 | ||
secure@intel.com | http://www.vmware.com/security/advisories/VMSA-2018-0020.html | Third Party Advisory | |
secure@intel.com | http://xenbits.xen.org/xsa/advisory-273.html | Third Party Advisory | |
secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2384 | Third Party Advisory | |
secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2387 | Third Party Advisory | |
secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2388 | Third Party Advisory | |
secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2389 | Third Party Advisory | |
secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2390 | Third Party Advisory | |
secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2391 | Third Party Advisory | |
secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2392 | Third Party Advisory | |
secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2393 | Third Party Advisory | |
secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2394 | Third Party Advisory | |
secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2395 | Third Party Advisory | |
secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2396 | Third Party Advisory | |
secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2402 | Third Party Advisory | |
secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2403 | Third Party Advisory | |
secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2404 | Third Party Advisory | |
secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2602 | ||
secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2603 | ||
secure@intel.com | https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf | ||
secure@intel.com | https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf | ||
secure@intel.com | https://foreshadowattack.eu/ | Technical Description, Third Party Advisory | |
secure@intel.com | https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 | ||
secure@intel.com | https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html | ||
secure@intel.com | https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html | ||
secure@intel.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V4UWGORQWCENCIF2BHWUEF2ODBV75QS2/ | ||
secure@intel.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XRFKQWYV2H4BV75CUNGCGE5TNVQCLBGZ/ | ||
secure@intel.com | https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018 | ||
secure@intel.com | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0010 | Third Party Advisory | |
secure@intel.com | https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.asc | Third Party Advisory | |
secure@intel.com | https://security.gentoo.org/glsa/201810-06 | ||
secure@intel.com | https://security.netapp.com/advisory/ntap-20180815-0001/ | Third Party Advisory | |
secure@intel.com | https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault | Mitigation, Vendor Advisory | |
secure@intel.com | https://support.f5.com/csp/article/K31300402 | Third Party Advisory | |
secure@intel.com | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03874en_us | Third Party Advisory | |
secure@intel.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel | Third Party Advisory | |
secure@intel.com | https://usn.ubuntu.com/3740-1/ | Third Party Advisory | |
secure@intel.com | https://usn.ubuntu.com/3740-2/ | Third Party Advisory | |
secure@intel.com | https://usn.ubuntu.com/3741-1/ | Third Party Advisory | |
secure@intel.com | https://usn.ubuntu.com/3741-2/ | ||
secure@intel.com | https://usn.ubuntu.com/3742-1/ | Third Party Advisory | |
secure@intel.com | https://usn.ubuntu.com/3742-2/ | Third Party Advisory | |
secure@intel.com | https://usn.ubuntu.com/3756-1/ | ||
secure@intel.com | https://usn.ubuntu.com/3823-1/ | ||
secure@intel.com | https://www.debian.org/security/2018/dsa-4274 | ||
secure@intel.com | https://www.debian.org/security/2018/dsa-4279 | ||
secure@intel.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html | Vendor Advisory | |
secure@intel.com | https://www.kb.cert.org/vuls/id/982149 | ||
secure@intel.com | https://www.oracle.com/security-alerts/cpujul2020.html | ||
secure@intel.com | https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html | ||
secure@intel.com | https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html | ||
secure@intel.com | https://www.synology.com/support/security/Synology_SA_18_45 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://support.lenovo.com/us/en/solutions/LEN-24163 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/105080 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1041451 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1042004 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2018-0020.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://xenbits.xen.org/xsa/advisory-273.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2384 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2387 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2388 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2389 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2390 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2391 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2392 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2393 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2394 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2395 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2396 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2402 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2403 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2404 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2602 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2603 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf | ||
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf | ||
af854a3a-2127-422b-91ae-364da2661108 | https://foreshadowattack.eu/ | Technical Description, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V4UWGORQWCENCIF2BHWUEF2ODBV75QS2/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XRFKQWYV2H4BV75CUNGCGE5TNVQCLBGZ/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0010 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.asc | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201810-06 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20180815-0001/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K31300402 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03874en_us | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3740-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3740-2/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3741-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3741-2/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3742-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3742-2/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3756-1/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3823-1/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2018/dsa-4274 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2018/dsa-4279 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/982149 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpujul2020.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.synology.com/support/security/Synology_SA_18_45 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | core_i3 | 330e | |
intel | core_i3 | 330m | |
intel | core_i3 | 330um | |
intel | core_i3 | 350m | |
intel | core_i3 | 370m | |
intel | core_i3 | 380m | |
intel | core_i3 | 380um | |
intel | core_i3 | 390m | |
intel | core_i3 | 530 | |
intel | core_i3 | 540 | |
intel | core_i3 | 550 | |
intel | core_i3 | 560 | |
intel | core_i3 | 2100 | |
intel | core_i3 | 2100t | |
intel | core_i3 | 2102 | |
intel | core_i3 | 2105 | |
intel | core_i3 | 2115c | |
intel | core_i3 | 2120 | |
intel | core_i3 | 2120t | |
intel | core_i3 | 2125 | |
intel | core_i3 | 2130 | |
intel | core_i3 | 2310e | |
intel | core_i3 | 2310m | |
intel | core_i3 | 2312m | |
intel | core_i3 | 2328m | |
intel | core_i3 | 2330e | |
intel | core_i3 | 2330m | |
intel | core_i3 | 2340ue | |
intel | core_i3 | 2348m | |
intel | core_i3 | 2350m | |
intel | core_i3 | 2357m | |
intel | core_i3 | 2365m | |
intel | core_i3 | 2367m | |
intel | core_i3 | 2370m | |
intel | core_i3 | 2375m | |
intel | core_i3 | 2377m | |
intel | core_i3 | 3110m | |
intel | core_i3 | 3115c | |
intel | core_i3 | 3120m | |
intel | core_i3 | 3120me | |
intel | core_i3 | 3130m | |
intel | core_i3 | 3210 | |
intel | core_i3 | 3217u | |
intel | core_i3 | 3217ue | |
intel | core_i3 | 3220 | |
intel | core_i3 | 3220t | |
intel | core_i3 | 3225 | |
intel | core_i3 | 3227u | |
intel | core_i3 | 3229y | |
intel | core_i3 | 3240 | |
intel | core_i3 | 3240t | |
intel | core_i3 | 3245 | |
intel | core_i3 | 3250 | |
intel | core_i3 | 3250t | |
intel | core_i3 | 4000m | |
intel | core_i3 | 4005u | |
intel | core_i3 | 4010u | |
intel | core_i3 | 4010y | |
intel | core_i3 | 4012y | |
intel | core_i3 | 4020y | |
intel | core_i3 | 4025u | |
intel | core_i3 | 4030u | |
intel | core_i3 | 4030y | |
intel | core_i3 | 4100e | |
intel | core_i3 | 4100m | |
intel | core_i3 | 4100u | |
intel | core_i3 | 4102e | |
intel | core_i3 | 4110e | |
intel | core_i3 | 4110m | |
intel | core_i3 | 4112e | |
intel | core_i3 | 4120u | |
intel | core_i3 | 4130 | |
intel | core_i3 | 4130t | |
intel | core_i3 | 4150 | |
intel | core_i3 | 4150t | |
intel | core_i3 | 4158u | |
intel | core_i3 | 4160 | |
intel | core_i3 | 4160t | |
intel | core_i3 | 4170 | |
intel | core_i3 | 4170t | |
intel | core_i3 | 4330 | |
intel | core_i3 | 4330t | |
intel | core_i3 | 4330te | |
intel | core_i3 | 4340 | |
intel | core_i3 | 4340te | |
intel | core_i3 | 4350 | |
intel | core_i3 | 4350t | |
intel | core_i3 | 4360 | |
intel | core_i3 | 4360t | |
intel | core_i3 | 4370 | |
intel | core_i3 | 4370t | |
intel | core_i3 | 5005u | |
intel | core_i3 | 5010u | |
intel | core_i3 | 5015u | |
intel | core_i3 | 5020u | |
intel | core_i3 | 5157u | |
intel | core_i3 | 6006u | |
intel | core_i3 | 6098p | |
intel | core_i3 | 6100 | |
intel | core_i3 | 6100e | |
intel | core_i3 | 6100h | |
intel | core_i3 | 6100t | |
intel | core_i3 | 6100te | |
intel | core_i3 | 6100u | |
intel | core_i3 | 6102e | |
intel | core_i3 | 6157u | |
intel | core_i3 | 6167u | |
intel | core_i3 | 6300 | |
intel | core_i3 | 6300t | |
intel | core_i3 | 6320 | |
intel | core_i3 | 8100 | |
intel | core_i3 | 8350k | |
intel | core_i5 | 430m | |
intel | core_i5 | 430um | |
intel | core_i5 | 450m | |
intel | core_i5 | 460m | |
intel | core_i5 | 470um | |
intel | core_i5 | 480m | |
intel | core_i5 | 520e | |
intel | core_i5 | 520m | |
intel | core_i5 | 520um | |
intel | core_i5 | 540m | |
intel | core_i5 | 540um | |
intel | core_i5 | 560m | |
intel | core_i5 | 560um | |
intel | core_i5 | 580m | |
intel | core_i5 | 650 | |
intel | core_i5 | 655k | |
intel | core_i5 | 660 | |
intel | core_i5 | 661 | |
intel | core_i5 | 670 | |
intel | core_i5 | 680 | |
intel | core_i5 | 750 | |
intel | core_i5 | 750s | |
intel | core_i5 | 760 | |
intel | core_i5 | 2300 | |
intel | core_i5 | 2310 | |
intel | core_i5 | 2320 | |
intel | core_i5 | 2380p | |
intel | core_i5 | 2390t | |
intel | core_i5 | 2400 | |
intel | core_i5 | 2400s | |
intel | core_i5 | 2405s | |
intel | core_i5 | 2410m | |
intel | core_i5 | 2430m | |
intel | core_i5 | 2435m | |
intel | core_i5 | 2450m | |
intel | core_i5 | 2450p | |
intel | core_i5 | 2467m | |
intel | core_i5 | 2500 | |
intel | core_i5 | 2500k | |
intel | core_i5 | 2500s | |
intel | core_i5 | 2500t | |
intel | core_i5 | 2510e | |
intel | core_i5 | 2515e | |
intel | core_i5 | 2520m | |
intel | core_i5 | 2537m | |
intel | core_i5 | 2540m | |
intel | core_i5 | 2550k | |
intel | core_i5 | 2557m | |
intel | core_i5 | 3210m | |
intel | core_i5 | 3230m | |
intel | core_i5 | 3317u | |
intel | core_i5 | 3320m | |
intel | core_i5 | 3330 | |
intel | core_i5 | 3330s | |
intel | core_i5 | 3337u | |
intel | core_i5 | 3339y | |
intel | core_i5 | 3340 | |
intel | core_i5 | 3340m | |
intel | core_i5 | 3340s | |
intel | core_i5 | 3350p | |
intel | core_i5 | 3360m | |
intel | core_i5 | 3380m | |
intel | core_i5 | 3427u | |
intel | core_i5 | 3437u | |
intel | core_i5 | 3439y | |
intel | core_i5 | 3450 | |
intel | core_i5 | 3450s | |
intel | core_i5 | 3470 | |
intel | core_i5 | 3470s | |
intel | core_i5 | 3470t | |
intel | core_i5 | 3475s | |
intel | core_i5 | 3550 | |
intel | core_i5 | 3550s | |
intel | core_i5 | 3570 | |
intel | core_i5 | 3570k | |
intel | core_i5 | 3570s | |
intel | core_i5 | 3570t | |
intel | core_i5 | 3610me | |
intel | core_i5 | 4200h | |
intel | core_i5 | 4200m | |
intel | core_i5 | 4200u | |
intel | core_i5 | 4200y | |
intel | core_i5 | 4202y | |
intel | core_i5 | 4210h | |
intel | core_i5 | 4210m | |
intel | core_i5 | 4210u | |
intel | core_i5 | 4210y | |
intel | core_i5 | 4220y | |
intel | core_i5 | 4250u | |
intel | core_i5 | 4258u | |
intel | core_i5 | 4260u | |
intel | core_i5 | 4278u | |
intel | core_i5 | 4288u | |
intel | core_i5 | 4300m | |
intel | core_i5 | 4300u | |
intel | core_i5 | 4300y | |
intel | core_i5 | 4302y | |
intel | core_i5 | 4308u | |
intel | core_i5 | 4310m | |
intel | core_i5 | 4310u | |
intel | core_i5 | 4330m | |
intel | core_i5 | 4340m | |
intel | core_i5 | 4350u | |
intel | core_i5 | 4360u | |
intel | core_i5 | 4400e | |
intel | core_i5 | 4402e | |
intel | core_i5 | 4402ec | |
intel | core_i5 | 4410e | |
intel | core_i5 | 4422e | |
intel | core_i5 | 4430 | |
intel | core_i5 | 4430s | |
intel | core_i5 | 4440 | |
intel | core_i5 | 4440s | |
intel | core_i5 | 4460 | |
intel | core_i5 | 4460s | |
intel | core_i5 | 4460t | |
intel | core_i5 | 4570 | |
intel | core_i5 | 4570r | |
intel | core_i5 | 4570s | |
intel | core_i5 | 4570t | |
intel | core_i5 | 4570te | |
intel | core_i5 | 4590 | |
intel | core_i5 | 4590s | |
intel | core_i5 | 4590t | |
intel | core_i5 | 4670 | |
intel | core_i5 | 4670k | |
intel | core_i5 | 4670r | |
intel | core_i5 | 4670s | |
intel | core_i5 | 4670t | |
intel | core_i5 | 4690 | |
intel | core_i5 | 4690k | |
intel | core_i5 | 4690s | |
intel | core_i5 | 4690t | |
intel | core_i5 | 5200u | |
intel | core_i5 | 5250u | |
intel | core_i5 | 5257u | |
intel | core_i5 | 5287u | |
intel | core_i5 | 5300u | |
intel | core_i5 | 5350h | |
intel | core_i5 | 5350u | |
intel | core_i5 | 5575r | |
intel | core_i5 | 5675c | |
intel | core_i5 | 5675r | |
intel | core_i5 | 6200u | |
intel | core_i5 | 6260u | |
intel | core_i5 | 6267u | |
intel | core_i5 | 6287u | |
intel | core_i5 | 6300hq | |
intel | core_i5 | 6300u | |
intel | core_i5 | 6350hq | |
intel | core_i5 | 6360u | |
intel | core_i5 | 6400 | |
intel | core_i5 | 6400t | |
intel | core_i5 | 6402p | |
intel | core_i5 | 6440eq | |
intel | core_i5 | 6440hq | |
intel | core_i5 | 6442eq | |
intel | core_i5 | 6500 | |
intel | core_i5 | 6500t | |
intel | core_i5 | 6500te | |
intel | core_i5 | 6585r | |
intel | core_i5 | 6600 | |
intel | core_i5 | 6600k | |
intel | core_i5 | 6600t | |
intel | core_i5 | 6685r | |
intel | core_i5 | 8250u | |
intel | core_i5 | 8350u | |
intel | core_i5 | 8400 | |
intel | core_i5 | 8600k | |
intel | core_i7 | 7y75 | |
intel | core_i7 | 610e | |
intel | core_i7 | 620le | |
intel | core_i7 | 620lm | |
intel | core_i7 | 620m | |
intel | core_i7 | 620ue | |
intel | core_i7 | 620um | |
intel | core_i7 | 640lm | |
intel | core_i7 | 640m | |
intel | core_i7 | 640um | |
intel | core_i7 | 660lm | |
intel | core_i7 | 660ue | |
intel | core_i7 | 660um | |
intel | core_i7 | 680um | |
intel | core_i7 | 720qm | |
intel | core_i7 | 740qm | |
intel | core_i7 | 820qm | |
intel | core_i7 | 840qm | |
intel | core_i7 | 860 | |
intel | core_i7 | 860s | |
intel | core_i7 | 870 | |
intel | core_i7 | 870s | |
intel | core_i7 | 875k | |
intel | core_i7 | 880 | |
intel | core_i7 | 920 | |
intel | core_i7 | 920xm | |
intel | core_i7 | 930 | |
intel | core_i7 | 940 | |
intel | core_i7 | 940xm | |
intel | core_i7 | 950 | |
intel | core_i7 | 960 | |
intel | core_i7 | 965 | |
intel | core_i7 | 970 | |
intel | core_i7 | 975 | |
intel | core_i7 | 980 | |
intel | core_i7 | 980x | |
intel | core_i7 | 990x | |
intel | core_i7 | 2600 | |
intel | core_i7 | 2600k | |
intel | core_i7 | 2600s | |
intel | core_i7 | 2610ue | |
intel | core_i7 | 2617m | |
intel | core_i7 | 2620m | |
intel | core_i7 | 2629m | |
intel | core_i7 | 2630qm | |
intel | core_i7 | 2635qm | |
intel | core_i7 | 2637m | |
intel | core_i7 | 2640m | |
intel | core_i7 | 2649m | |
intel | core_i7 | 2655le | |
intel | core_i7 | 2657m | |
intel | core_i7 | 2670qm | |
intel | core_i7 | 2675qm | |
intel | core_i7 | 2677m | |
intel | core_i7 | 2700k | |
intel | core_i7 | 2710qe | |
intel | core_i7 | 2715qe | |
intel | core_i7 | 2720qm | |
intel | core_i7 | 2760qm | |
intel | core_i7 | 2820qm | |
intel | core_i7 | 2860qm | |
intel | core_i7 | 2920xm | |
intel | core_i7 | 2960xm | |
intel | core_i7 | 3517u | |
intel | core_i7 | 3517ue | |
intel | core_i7 | 3520m | |
intel | core_i7 | 3537u | |
intel | core_i7 | 3540m | |
intel | core_i7 | 3555le | |
intel | core_i7 | 3610qe | |
intel | core_i7 | 3610qm | |
intel | core_i7 | 3612qe | |
intel | core_i7 | 3612qm | |
intel | core_i7 | 3615qe | |
intel | core_i7 | 3615qm | |
intel | core_i7 | 3630qm | |
intel | core_i7 | 3632qm | |
intel | core_i7 | 3635qm | |
intel | core_i7 | 3667u | |
intel | core_i7 | 3687u | |
intel | core_i7 | 3689y | |
intel | core_i7 | 3720qm | |
intel | core_i7 | 3740qm | |
intel | core_i7 | 3770 | |
intel | core_i7 | 3770k | |
intel | core_i7 | 3770s | |
intel | core_i7 | 3770t | |
intel | core_i7 | 3820qm | |
intel | core_i7 | 3840qm | |
intel | core_i7 | 4500u | |
intel | core_i7 | 4510u | |
intel | core_i7 | 4550u | |
intel | core_i7 | 4558u | |
intel | core_i7 | 4578u | |
intel | core_i7 | 4600m | |
intel | core_i7 | 4600u | |
intel | core_i7 | 4610m | |
intel | core_i7 | 4610y | |
intel | core_i7 | 4650u | |
intel | core_i7 | 4700ec | |
intel | core_i7 | 4700eq | |
intel | core_i7 | 4700hq | |
intel | core_i7 | 4700mq | |
intel | core_i7 | 4702ec | |
intel | core_i7 | 4702hq | |
intel | core_i7 | 4702mq | |
intel | core_i7 | 4710hq | |
intel | core_i7 | 4710mq | |
intel | core_i7 | 4712hq | |
intel | core_i7 | 4712mq | |
intel | core_i7 | 4720hq | |
intel | core_i7 | 4722hq | |
intel | core_i7 | 4750hq | |
intel | core_i7 | 4760hq | |
intel | core_i7 | 4765t | |
intel | core_i7 | 4770 | |
intel | core_i7 | 4770hq | |
intel | core_i7 | 4770k | |
intel | core_i7 | 4770r | |
intel | core_i7 | 4770s | |
intel | core_i7 | 4770t | |
intel | core_i7 | 4770te | |
intel | core_i7 | 4771 | |
intel | core_i7 | 4785t | |
intel | core_i7 | 4790 | |
intel | core_i7 | 4790k | |
intel | core_i7 | 4790s | |
intel | core_i7 | 4790t | |
intel | core_i7 | 4800mq | |
intel | core_i7 | 4810mq | |
intel | core_i7 | 4850hq | |
intel | core_i7 | 4860hq | |
intel | core_i7 | 4870hq | |
intel | core_i7 | 4900mq | |
intel | core_i7 | 4910mq | |
intel | core_i7 | 4950hq | |
intel | core_i7 | 4960hq | |
intel | core_i7 | 4980hq | |
intel | core_i7 | 5500u | |
intel | core_i7 | 5550u | |
intel | core_i7 | 5557u | |
intel | core_i7 | 5600u | |
intel | core_i7 | 5650u | |
intel | core_i7 | 5700eq | |
intel | core_i7 | 5700hq | |
intel | core_i7 | 5750hq | |
intel | core_i7 | 5775c | |
intel | core_i7 | 5775r | |
intel | core_i7 | 5850eq | |
intel | core_i7 | 5850hq | |
intel | core_i7 | 5950hq | |
intel | core_i7 | 7500u | |
intel | core_i7 | 7560u | |
intel | core_i7 | 7567u | |
intel | core_i7 | 7600u | |
intel | core_i7 | 7660u | |
intel | core_i7 | 7700 | |
intel | core_i7 | 7700hq | |
intel | core_i7 | 7700k | |
intel | core_i7 | 7700t | |
intel | core_i7 | 7820eq | |
intel | core_i7 | 7820hk | |
intel | core_i7 | 7820hq | |
intel | core_i7 | 7920hq | |
intel | core_i7 | 8550u | |
intel | core_i7 | 8650u | |
intel | core_i7 | 8700 | |
intel | core_i7 | 8700k | |
intel | core_m | 5y10 | |
intel | core_m | 5y10a | |
intel | core_m | 5y10c | |
intel | core_m | 5y31 | |
intel | core_m | 5y51 | |
intel | core_m | 5y70 | |
intel | core_m | 5y71 | |
intel | core_m3 | 6y30 | |
intel | core_m3 | 7y30 | |
intel | core_m3 | 7y32 | |
intel | core_m5 | 6y54 | |
intel | core_m5 | 6y57 | |
intel | core_m7 | 6y75 | |
intel | xeon | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*", "matchCriteriaId": "A4229DB2-8BBC-49F8-87A8-2E7D56EFD310", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*", "matchCriteriaId": "FEBA7322-4D95-4E70-B6A5-E0D8F1B5D7EB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*", "matchCriteriaId": "A0E91F46-D950-4894-BACF-05A70C7C6F7B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*", "matchCriteriaId": "0E12B40B-5221-48A6-B2A6-D44CD5636BB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*", "matchCriteriaId": "6BCB77C9-ABE3-44A0-B377-7D7035E8A11F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*", "matchCriteriaId": "D06639F5-5EE8-44F4-B48A-5694383154DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*", "matchCriteriaId": "CD9662C9-59D3-4B3E-A4DA-4F1EE16FC94B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*", "matchCriteriaId": "637C3687-FBCC-41A0-BFE6-823BAE45FB92", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*", "matchCriteriaId": "2350A197-193F-4B22-80E8-3275C97C78EE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*", "matchCriteriaId": "734C7A7E-ACCA-4B34-BF38-0FAED988CC6A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*", "matchCriteriaId": "4D9ABAFC-B3B5-449D-A48E-2E978563EDE7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*", "matchCriteriaId": "99019EA0-6576-4CE7-B60A-975D418AA917", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*", "matchCriteriaId": "8E846AEF-751D-40AD-84B5-EFDC9CF23E2F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*", "matchCriteriaId": "EB9DD909-B2AC-46BA-B057-D239D0773CAD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*", "matchCriteriaId": "54F5C355-FDFC-4E71-93AA-218389EF10E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*", "matchCriteriaId": "B0A1CA1E-971D-4F67-864E-2E772C1E736B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*", "matchCriteriaId": "1B5F8391-D974-49AC-8550-ADB3FA6C0535", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*", "matchCriteriaId": "8302BF58-9E54-40DA-BCFE-59CA52C460D9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*", "matchCriteriaId": "ECCDE9EF-037B-4650-8131-4D57BE141277", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*", "matchCriteriaId": "47BA9DA8-F690-4E3C-AEF6-6A5C7BAA6F19", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*", "matchCriteriaId": "DB8253DA-9A04-40D6-84C1-C682B4023D4B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*", "matchCriteriaId": "DAF6D175-85C3-4C72-AD9F-31B47EF43154", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*", "matchCriteriaId": "7A5FC594-2092-4240-9538-235BBE236DD9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*", "matchCriteriaId": "87D95F00-EA89-4FDE-991C-56636B8E0331", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*", "matchCriteriaId": "32C40D38-F7F2-4A48-ADAA-6A8BBD6A1A00", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*", "matchCriteriaId": "4158561F-8270-42D1-91D8-E063CE7F5505", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*", "matchCriteriaId": "FF0DEA96-0202-41EB-BDC3-24E2FC4415B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*", "matchCriteriaId": "F8BACE1C-5D66-4FBC-8F86-30215A623A94", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*", "matchCriteriaId": "CF707146-0D64-4F3A-AE22-956EA1CB32B6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*", "matchCriteriaId": "8118C3F9-0853-4E87-9E65-86E1398B2780", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*", "matchCriteriaId": "1A298501-C4D7-48D4-90F9-15AFA59DED48", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*", "matchCriteriaId": "FEE1B07B-3D92-4D2D-8667-D902F002277F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*", "matchCriteriaId": "8F05CB19-1059-4C4D-BFD7-9F51A22A4F97", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*", "matchCriteriaId": "5588732F-7F1A-4C24-B35F-30532107FFDE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*", "matchCriteriaId": "A127DD5D-426D-4F24-A8C5-DC9DAC94B91C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*", "matchCriteriaId": "26EE0BBD-3982-4B0F-82F6-D58E077C75DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*", "matchCriteriaId": "FAEEC918-EA25-4B38-B5C3-85899D3EBE6C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*", "matchCriteriaId": "813965F4-3BDA-4478-8E6A-0FD52723B764", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*", "matchCriteriaId": "2C5EA2F4-F3EF-4305-B1A1-92F636ED688F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*", "matchCriteriaId": "04384319-EE8C-45B4-8BDD-414502E7C02D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*", "matchCriteriaId": "C52528CE-4F31-4E5F-8255-E576B20F3043", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*", "matchCriteriaId": "A6C3F422-F865-4160-AA24-1DAFAE63729C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*", "matchCriteriaId": "5D034E7F-4D17-49D7-BDB2-90CB4C709B30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*", "matchCriteriaId": "3C18E6B4-E947-403B-80FB-7095420D482B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*", "matchCriteriaId": "2814CC9F-E027-4C5A-93AF-84EA445E6C12", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*", "matchCriteriaId": "24A470C3-AAAA-4A6E-B738-FEB69DB78B9D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*", "matchCriteriaId": "A1236944-4942-40E4-9BA1-029FEAE94BBC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*", "matchCriteriaId": "086CAB4B-A10A-4165-BC33-33CADCD23C0F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*", "matchCriteriaId": "B1A6A1EB-B3AB-4CB4-827E-CCAAD783F8E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*", "matchCriteriaId": "AAFB6B30-BFB0-4397-9E16-37D1A772E639", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*", "matchCriteriaId": "DFCB9D7B-7D0A-435D-8499-C16BE09E19FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*", "matchCriteriaId": "64277594-9713-436B-8056-542CFA9F4CFC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*", "matchCriteriaId": "589BB170-7CBA-4F28-99E3-9242B62E2918", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*", "matchCriteriaId": "91B9C4D9-DA09-4377-9DCD-225857BD9FA7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*", "matchCriteriaId": "03D0265F-840B-45A1-90BD-9ED8846A9F63", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*", "matchCriteriaId": "74BAC0EC-2B38-4553-A399-4BD5483C4753", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*", "matchCriteriaId": "4477EBA6-F0A7-452B-96E8-BA788370CCA8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*", "matchCriteriaId": "1285D817-B5B8-4940-925D-FCDD24810AE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*", "matchCriteriaId": "D289F7B4-27CD-4433-BB45-06AF98A59B7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*", "matchCriteriaId": "00168903-6012-4414-87D1-2EE52AA6D78E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*", "matchCriteriaId": "6AE8D524-577E-4994-8A4B-D15022C84D7F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*", "matchCriteriaId": "75977B0B-C44D-43BC-8D7A-AF966CDB1901", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*", "matchCriteriaId": "AE7F5D52-9F41-49A4-B941-E0D777203FF7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*", "matchCriteriaId": "52B5B3FD-5BEA-4DE8-B010-55FED1547167", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*", "matchCriteriaId": "167B1B04-5823-4038-A019-3975A3B447C9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*", "matchCriteriaId": "F6C7A4EA-0B5E-47CD-8924-3B1B60EB4BE4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*", "matchCriteriaId": "1BA096E0-5480-47CB-822B-D11D7E20F69F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*", "matchCriteriaId": "30357469-0B8F-4385-A282-2F50181EA442", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*", "matchCriteriaId": "3BE70772-7796-4594-880A-6AAD046E4D8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*", "matchCriteriaId": "1A9E2F8D-2974-4833-9EC2-233CEE257C26", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*", "matchCriteriaId": "17EE3078-454F-48F8-B201-3847DB40D5C4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*", "matchCriteriaId": "EE32C500-55C2-41A7-8621-14EBF793BF11", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*", "matchCriteriaId": "52D3DF52-501A-4656-98F1-8DD51D04F31F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*", "matchCriteriaId": "3EA603AD-6CF1-44B2-876D-6F1C0B7EF2C9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*", "matchCriteriaId": "09578301-CF39-4C24-951A-535743E277EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*", "matchCriteriaId": "1F4D14AA-7DBF-4B73-BDEF-6248EF5C0F7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*", "matchCriteriaId": "5A65F303-96C8-4884-8D6F-F439B86BA30C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*", "matchCriteriaId": "1E046105-9DF5-425F-A97E-16081D54613C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*", "matchCriteriaId": "B2987BCF-39E6-49B6-8DEE-963A38F12B07", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*", "matchCriteriaId": "7AEDE2B7-9AA2-4A14-8A02-9A2BFF0DDCBF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*", "matchCriteriaId": "5AD92AD8-033A-4AAD-91E5-CB446CCE9732", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*", "matchCriteriaId": "77E0E73A-F1B4-4E70-B9F1-EE97785B8891", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*", "matchCriteriaId": "61D6E3CC-79B1-4995-9A76-41683C7F254A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*", "matchCriteriaId": "F9CEB2B1-BD1A-4B89-8E03-4F90F04A0F0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*", "matchCriteriaId": "6FE5773D-3CD1-4E63-8983-E0105C46D185", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*", "matchCriteriaId": "2A7C307A-6576-4A0A-8F4E-0981C9EE2901", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*", "matchCriteriaId": "18B3A53B-902C-46A5-8CE7-B55102703278", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*", "matchCriteriaId": "AB843479-729A-4E58-8027-0FC586F051AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*", "matchCriteriaId": "1AF5A233-1E77-49FD-AC2C-60D185481E28", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*", "matchCriteriaId": "18519CF2-B0DA-42DD-8A3E-9084298C210A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*", "matchCriteriaId": "329D5FCF-7EC5-4471-906B-3619A180BD52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*", "matchCriteriaId": "0DD43EAA-F3A5-4748-9187-A6E6707ACD11", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*", "matchCriteriaId": "C6F3C14D-4BFC-4205-8781-95E6B28C83C1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*", "matchCriteriaId": "20942AD8-ADB7-4A50-BDBE-DB36249F4F52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*", "matchCriteriaId": "1EC6ED02-134B-4322-AB72-75A0AB22701E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*", "matchCriteriaId": "6FA74EEE-54CC-4F80-B1D3-99F7771335ED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*", "matchCriteriaId": "B6B859F7-0373-4ADD-92B3-0FAB42FCF23C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*", "matchCriteriaId": "AAC76F31-00A5-4719-AA50-92F773919B3C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*", "matchCriteriaId": "49996F5A-51B2-4D4E-AE04-E98E093A76CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*", "matchCriteriaId": "9F8406B0-D1E5-4633-B17E-53DC99FE7622", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*", "matchCriteriaId": "3D49435C-7C33-454B-9F43-9C10F28A28A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*", "matchCriteriaId": "D17E1A0F-1150-4899-81BC-BE84E4EF5FA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*", "matchCriteriaId": "EADD98AE-BAB0-440D-AB9F-2D76BE5109E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*", "matchCriteriaId": "ED44A404-8548-4EDC-8928-4094D05A6A38", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*", "matchCriteriaId": "3A6E4AA3-BEBC-4B14-9A52-A8F8B2954D64", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*", "matchCriteriaId": "D2AAD8F0-0D31-4806-8A88-A30E5BE43630", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*", "matchCriteriaId": "8164EE5F-6ABA-4365-8718-2F98C2E57A0F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*", "matchCriteriaId": "C7110AF9-A407-4EE2-9C46-E5F1E3638E9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*", "matchCriteriaId": "2A06696D-37F0-427D-BFC5-1606E7441C31", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*", "matchCriteriaId": "E9F8A5FC-5EFE-42EC-A49B-D3A312FB5F6F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*", "matchCriteriaId": "68A76015-0A05-4EC7-B136-DC13B55D881F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*", "matchCriteriaId": "C352DCE8-E8D9-40D3-AFE9-B5FB84F7ED33", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*", "matchCriteriaId": "54464F6C-9B2D-46BA-AC44-506389F3EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*", "matchCriteriaId": "8FA11017-EA58-45EE-8408-FCCCF7183643", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*", "matchCriteriaId": "8A5098A5-E4E8-47E4-8CD0-F607FF0C0C90", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*", "matchCriteriaId": "442AD778-D56F-4C30-BBF8-749D6AAC4737", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*", "matchCriteriaId": "AF7D3F31-AF4D-4C50-8590-A763AAC7AF07", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*", "matchCriteriaId": "445BFC2E-38FA-4130-8550-0866EC4EDA33", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*", "matchCriteriaId": "A6DC2746-CE41-40C9-8CFA-23231BBCAE77", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*", "matchCriteriaId": "3C3A8976-5E4D-490A-A87D-A47D1B2B903C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*", "matchCriteriaId": "0C8535E6-220E-4747-8992-45B6EAFC555C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*", "matchCriteriaId": "C7479B49-F484-4DF2-86CB-E52EE89FA238", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*", "matchCriteriaId": "B6D68512-746D-4E95-857B-13A0B6313C5E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*", "matchCriteriaId": "4312BA84-F9A0-4BD4-8438-058E1E7D6C0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*", "matchCriteriaId": "60E52DF5-C713-4BC4-B587-FF6BDA8509CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*", "matchCriteriaId": "304ADCAC-9E49-42BD-BC92-58D9B2AD52E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*", "matchCriteriaId": "2AB02172-B9A7-4801-88F2-98BF5843184A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*", "matchCriteriaId": "5141380E-BD18-47C1-A84C-384BA821773D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*", "matchCriteriaId": "1AE6C49E-2359-4E44-9979-7D34F8460E35", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*", "matchCriteriaId": "C004B75F-37AF-4E61-98F3-1B09A7062DDB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*", "matchCriteriaId": "F7126D19-C6D9-43CB-8809-647B1A20E7DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*", "matchCriteriaId": "9CC98503-A80A-4114-8BF2-E016659BE84E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*", "matchCriteriaId": "01E6F4A7-24BE-4AA0-9CDD-84FBC56FE9BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*", "matchCriteriaId": "3821412D-B010-49C4-A7B4-6C5FB6C603B1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*", "matchCriteriaId": "A34CA5CC-9EB1-4063-8B9D-3F566C1EFF76", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*", "matchCriteriaId": "5CEB5D2D-FF54-4BDB-9E9C-8C1B2719FC9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*", "matchCriteriaId": "6AD5B51A-AEA0-4DA2-BA60-94A2D5605352", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*", "matchCriteriaId": "F96C6CA0-434D-428F-B629-A971C2937628", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*", "matchCriteriaId": "301AB72A-A6F2-42C8-A931-94EF2271443F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*", "matchCriteriaId": "59414B5A-05B8-49AF-A197-2A31729DDB65", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*", "matchCriteriaId": "0BFDD380-692F-41D7-996F-F97FC74DC7CF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*", "matchCriteriaId": "49602828-2BFC-4571-9F05-6210FD263DF2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*", "matchCriteriaId": "87E03978-E16D-4A9B-8AE7-9F4F1171C14A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*", "matchCriteriaId": "03096A9A-5758-47E6-81E2-BCFE847C41F4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*", "matchCriteriaId": "150CC865-7975-45EC-BFF7-A94146442BA8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*", "matchCriteriaId": "C8FA1308-589B-432B-80F9-9A499D083ED5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*", "matchCriteriaId": "6ED2453E-30E1-4620-BEC5-21B0083449E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*", "matchCriteriaId": "0FE8DD05-D700-4F89-9B01-D489029DF7A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*", "matchCriteriaId": "050957CA-6191-4F9F-9D07-48B342B3B1B8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*", "matchCriteriaId": "DACBF998-8B11-45C7-9017-486AED4FAE6C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*", "matchCriteriaId": "C9F2F3C4-FC94-414A-A208-913A43D57D75", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*", "matchCriteriaId": "641152EC-F4B4-4E5E-B396-AC4CAAB805BF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*", "matchCriteriaId": "4911E332-B8BA-4336-A448-3F70D2BBB147", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*", "matchCriteriaId": "330EC403-3174-4543-9BBE-CEC0ABC1575D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*", "matchCriteriaId": "5EF585D0-507E-491E-9C3B-78EE26F2F070", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*", "matchCriteriaId": "DD00F7C6-6762-4DC9-9F6C-5EAC4ACB1C54", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*", "matchCriteriaId": "1F5D885A-85C4-4A11-B061-61EFF6B6E329", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*", "matchCriteriaId": "0502B59F-933C-4E25-A2EC-9296B197E139", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*", "matchCriteriaId": "99D9C0A9-2DFF-4760-8FED-AC2DA7968E51", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*", "matchCriteriaId": "B5A1BAEC-18BF-4607-BFB7-48102E75186A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*", "matchCriteriaId": "D49ED138-F42D-4451-A350-0B2DD5AB9444", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*", "matchCriteriaId": "5ED91472-90FC-4AC8-96D5-1550A8502411", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*", "matchCriteriaId": "57CEEFA6-CEED-4CA3-8DDC-B6601D69FB7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*", "matchCriteriaId": "2FD25ECD-0605-4CD7-9DC5-294ACD7EF1B0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*", "matchCriteriaId": "2784E2AF-A5E5-4960-830C-B3EFB84043D0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*", "matchCriteriaId": "9112FA50-5527-4B20-80F5-2DE9E66D09F6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*", "matchCriteriaId": "73CE4E2E-B2BF-409E-B18C-D67DA810FE9B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*", "matchCriteriaId": "E2B84D67-0B1D-4B74-BC85-AF8F933D8429", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*", "matchCriteriaId": "BCA05A18-1523-4EED-9D2E-0A258A33F24F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*", "matchCriteriaId": "C34E70EB-92F0-43F6-8883-FE422BE1A3FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*", "matchCriteriaId": "78D301F1-20C2-4756-9A90-37F14835CE14", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*", "matchCriteriaId": "B2EEC8B5-1CAB-4FBE-BBA2-D2FFA3EF9489", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*", "matchCriteriaId": "BA63B803-4D48-42E8-A793-F92ABCB8BFC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*", "matchCriteriaId": "129DB9CB-E878-4856-A954-15FFE1428636", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*", "matchCriteriaId": "730DB4AA-FD7D-40C6-8D7F-19937832EF9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*", "matchCriteriaId": "07E86978-4820-422A-8C7C-FF0697DAED05", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*", "matchCriteriaId": "8A7A9DB5-F544-4FD8-A9CC-0BD6257516AF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*", "matchCriteriaId": "AF813AD9-D296-4915-861C-8DE929E45FE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*", "matchCriteriaId": "04A65469-083F-40B5-86C5-A2EAE5B2F00A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*", "matchCriteriaId": "8F1AA82E-BD86-40F5-B417-71DF6AF53A37", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*", "matchCriteriaId": "B71A6DB0-5EB0-4712-8480-CF427F521D33", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*", "matchCriteriaId": "8223D5A1-ADF1-43C6-AF91-EE5C413BCB37", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*", "matchCriteriaId": "4DD69605-F52B-4623-921A-983A5A408ECA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*", "matchCriteriaId": "B1D5685F-6FFE-4A6A-9FF8-940C8DA36499", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*", "matchCriteriaId": "B94062D9-8DDA-4B4A-B3B5-07F71F5B97E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*", "matchCriteriaId": "3832D0A6-419D-4876-B5C4-920578F713F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*", "matchCriteriaId": "E1AA5C8A-83A8-4F96-9D7C-7A50ADDB2341", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*", "matchCriteriaId": "404E38E6-9EB3-41D0-97A7-DC579688BFB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*", "matchCriteriaId": "40E4A921-AB28-47B7-B5A3-EB82193D15BA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*", "matchCriteriaId": "B0357E48-2300-47B4-B9E5-9FE813A2FC09", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*", "matchCriteriaId": "96CC28B6-57D1-4919-AA55-A262CC16AFE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*", "matchCriteriaId": "0EB4C54D-1265-425A-B507-E1099844875A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*", "matchCriteriaId": "97362147-3A71-430D-9064-4435D45C3B8C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*", "matchCriteriaId": "89212CF3-4E99-4389-94CE-F4211DDCA01B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*", "matchCriteriaId": "FBEA4DA3-0AFB-4FCE-92DB-5B316775BB17", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*", "matchCriteriaId": "611C0A0A-1FA3-42F9-82E8-BFCB71A077DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*", "matchCriteriaId": "36F027D9-DCB4-4A3D-8987-41F2941DBD45", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*", "matchCriteriaId": "E23BCEC9-2BFB-4B41-9A7A-18B1347C6202", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*", "matchCriteriaId": "4924CE39-A846-4DB4-9547-6322FC5AD6B3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*", "matchCriteriaId": "6C9E2C9A-94A1-456B-90D5-54932DF64C22", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*", "matchCriteriaId": "AC04C652-B2D8-4002-A50E-8AFE83204A25", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*", "matchCriteriaId": "10D413F0-CDBC-4A63-B9A7-9E7725BA1E83", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*", "matchCriteriaId": "754A8826-59F7-4A71-B74B-737BE9C7DE4F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*", "matchCriteriaId": "FADB6BDA-6825-489B-AB39-7729BA45DFD8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*", "matchCriteriaId": "7913F57E-E600-4767-AF51-D045E1898E72", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*", "matchCriteriaId": "BD3783F4-5A05-45AA-9791-A681011FD78C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*", "matchCriteriaId": "01E3114D-31D2-4DBF-A664-F4049D8B6266", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*", "matchCriteriaId": "D8EE6578-981D-470C-BB24-4960B3CB1478", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*", "matchCriteriaId": "E3320D50-C5C9-4D75-BF1A-5BB7BCBFE2BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*", "matchCriteriaId": "7EE59839-8EB9-47FE-88E2-F0D54BE787A2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*", "matchCriteriaId": "75694A3D-080A-4AA7-97DF-5A5833C9D9F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*", "matchCriteriaId": "19C5E27D-BBAB-4395-8FC6-8E3D4FB9A1EE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*", "matchCriteriaId": "6E996176-3DEA-46E6-93B7-9C0DF32B59D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*", "matchCriteriaId": "4417007D-126A-478B-87EA-039D088A4515", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*", "matchCriteriaId": "F78C2825-F6A3-4188-9D25-59EAEC8A7B0A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*", "matchCriteriaId": "EF2FA85D-B117-410D-B247-8C5A3479319A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*", "matchCriteriaId": "3A041D27-132C-4B15-976F-1750C039A89F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*", "matchCriteriaId": "5D495E06-BF2B-4C5A-881D-94C93CD2BA2B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*", "matchCriteriaId": "7C31DFB8-8D8C-47D6-AAFF-BAE829A3D965", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*", "matchCriteriaId": "088BC395-06D5-4156-85EB-63C4A9552898", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*", "matchCriteriaId": "33A220A2-A6D2-46A7-B168-607400EEDCE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*", "matchCriteriaId": "1E79232F-7196-440B-82D4-165885251232", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*", "matchCriteriaId": "ED866954-77AB-4CA8-8AED-4252C595FC4D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*", "matchCriteriaId": "28A1F516-B180-45D4-8EB1-754B7497CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*", "matchCriteriaId": "36758A04-64D3-4150-A004-CF042FA31CD9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*", "matchCriteriaId": "1E01752E-F1DD-400A-A917-216CAF15B0F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*", "matchCriteriaId": "AD47EC58-F776-4F59-8F15-4B208904CF4B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*", "matchCriteriaId": "2D3781F4-2123-4FA1-8AF5-D0D1E6C1A5B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*", "matchCriteriaId": "94565E35-8A58-4CB6-A489-C796DCB97FC5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*", "matchCriteriaId": "49964D35-5323-4412-BD54-661630F9A8CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*", "matchCriteriaId": "F0A37E7D-1BF6-4A2A-BF52-5F0EC4B4F341", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*", "matchCriteriaId": "A0F66468-87D0-41FC-934B-5924BE2956CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*", "matchCriteriaId": "3E0F93E1-4607-4DF4-AC6E-4B7254D4A8DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*", "matchCriteriaId": "45C0D99E-443E-4AB1-A07A-900A09FE177E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*", "matchCriteriaId": "C6D0FD76-C1FB-43D0-8511-FC0BA6DA7960", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*", "matchCriteriaId": "A9DAEE52-09C3-4A09-9958-9D6807B2700B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*", "matchCriteriaId": "B97690D4-E814-4D40-B170-BE56D7AE2C1B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*", "matchCriteriaId": "89804F2C-D32D-4444-ABEA-5B241153D096", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*", "matchCriteriaId": "2AAAAF9C-B29B-4020-BAFF-C87B1A08294A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*", "matchCriteriaId": "ECE60E1E-AB8D-46E4-A779-A54F2D20B5D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*", "matchCriteriaId": "EB958A28-7C9A-4BD0-B002-4E1A65CDB0A4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*", "matchCriteriaId": "7C27B318-2AC1-423D-B0C8-583BB1800D5A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*", "matchCriteriaId": "9E58E3D0-1154-4B13-BA16-67CE67DF0637", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*", "matchCriteriaId": "32D2ACB3-B906-4944-A021-03C4645965BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*", "matchCriteriaId": "8FFF834A-D7F0-4E48-AD3D-DD0BCE6DEC0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*", "matchCriteriaId": "8E1A41BA-A1D6-484A-BAD2-68DF85598354", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*", "matchCriteriaId": "11260C9D-69A9-4D81-9CCF-2E116DD75F7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*", "matchCriteriaId": "1C020F06-FD27-46E3-A48F-3F60F33BB969", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*", "matchCriteriaId": "03C74F10-6A7F-4F68-8A34-E981E1760DE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*", "matchCriteriaId": "24741B98-8D0E-4307-AAEF-A14B2531DCA9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*", "matchCriteriaId": "8D4FA4BA-4304-4A70-9F86-120F2A3D8148", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*", "matchCriteriaId": "367FC8BA-F046-4264-A049-49E933E7698F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*", "matchCriteriaId": "DE9B68D3-1DFB-4468-85C4-AC13E6CBC111", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*", "matchCriteriaId": "C966A016-B650-44D9-B8C4-1ED50AB318DA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*", "matchCriteriaId": "DC448FF0-6D3F-4609-864B-4191905EE2B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*", "matchCriteriaId": "0FC246FE-4CA6-4B2D-83C3-D50A386C24A0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*", "matchCriteriaId": "758A14DB-1BAF-442A-BA7C-5E9C67847BEA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*", "matchCriteriaId": "61309100-CFA7-4607-A236-8910838AA057", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*", "matchCriteriaId": "82D76265-7BD0-4C51-AE77-22B22524DE81", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*", "matchCriteriaId": "DE38B195-BB8D-4747-881D-E8033760B4C8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*", "matchCriteriaId": "1AA8BE76-168D-48A3-8DF6-E91F44600408", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*", "matchCriteriaId": "3B656975-5D71-4712-9820-BDB7BC248AFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*", "matchCriteriaId": "FA045267-114D-4587-B6D7-E273C28DC9B1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*", "matchCriteriaId": "77018415-E122-406E-896D-1BC6CF790BE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*", "matchCriteriaId": "3ADF37F1-546B-4EF0-8DEC-DC3B9F5309FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*", "matchCriteriaId": "D7469256-1A64-46FF-8F5A-A8E9E3CF5BE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*", "matchCriteriaId": "7F9069B9-9FE3-4AD5-9A8E-55C0F73BD756", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*", "matchCriteriaId": "F4E1C012-3E05-44DB-B6D2-BFD619C034B4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*", "matchCriteriaId": "15D689D6-8594-42F2-8EEF-DCAEBA885A67", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*", "matchCriteriaId": "A6446000-0494-4DC5-ABAA-F20A44546068", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*", "matchCriteriaId": "99B94EEC-6690-45D0-B086-F4A5B25C25CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*", "matchCriteriaId": "8B767B6E-B3E6-4424-97A6-89A7E7EB0EEB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*", "matchCriteriaId": "832AB3CD-E3A1-4CCB-A210-287973563D0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*", "matchCriteriaId": "5A26C0CC-68AD-40F5-96B8-87E6C643F6F8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*", "matchCriteriaId": "99C4221A-9994-43B3-9C7A-E13815A50A10", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*", "matchCriteriaId": "20070B1D-B91C-40BA-A9D8-E80170A2933F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*", "matchCriteriaId": "A70129C9-371F-4542-A388-C095869E593A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*", "matchCriteriaId": "6C4DE25F-168A-4C67-8B66-09F61F072BD4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*", "matchCriteriaId": "58157F24-D89E-4552-8CE6-2F01E98BD1E5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*", "matchCriteriaId": "BC7FFD78-1E1C-4246-BBD3-73FAC06AA46B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*", "matchCriteriaId": "45ACBBEA-EC95-4F3E-B585-893DB6D21A0F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*", "matchCriteriaId": "7DEC55DF-1950-45E5-A5F2-B5604AFA1CBD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*", "matchCriteriaId": "A6A5EC79-1B21-4BB3-8791-73507BC8D4DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*", "matchCriteriaId": "FCB4AFC3-FE30-4F46-ADC1-D03EB14E757D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*", "matchCriteriaId": "E0387587-AAB6-4284-8516-4DA3E3582D30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*", "matchCriteriaId": "A238C975-9196-449F-9C15-ABB2E9FD1D06", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*", "matchCriteriaId": "6F17F4A5-120B-4E00-97C8-8A85841ACBC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*", "matchCriteriaId": "2537F047-64C9-4E73-B82C-310253184183", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*", "matchCriteriaId": "3A55857C-649D-46CE-AEDA-6E553E554FC1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*", "matchCriteriaId": "7BA4892D-AFDF-4441-821E-5EBF7F64C9F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*", "matchCriteriaId": "327E06A3-7F0E-4498-8811-10C8D15398FE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*", "matchCriteriaId": "1624E6D6-858E-4085-B0B9-362B819EFD88", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*", "matchCriteriaId": "50D61F4A-40F0-477C-8326-7359D3626E77", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*", "matchCriteriaId": "1455B4DE-7F1C-4CF2-AE02-2EDD20025D62", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*", "matchCriteriaId": "5B215788-860B-46CD-9A08-43AFF98FAEAA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*", "matchCriteriaId": "2B92FAD5-CA6E-48F7-9613-3A4CE90F5F54", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*", "matchCriteriaId": "E4EB132B-000C-4A17-AFB3-19F40A73D2CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*", "matchCriteriaId": "5C4815AE-B635-4545-83C2-5EC4E0128337", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*", "matchCriteriaId": "C0046C06-E3E6-4674-A4D1-332DD29D9552", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*", "matchCriteriaId": "2C191851-3DC3-41C7-AD89-81F091CCC83A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*", "matchCriteriaId": "21126922-8E81-47F4-82D4-CBCDDACEC4FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*", "matchCriteriaId": "209E18B0-BBB5-4C65-B336-44340F7740DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*", "matchCriteriaId": "C867C0B8-91A4-482A-B7DD-54AB9599AE52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*", "matchCriteriaId": "30F03843-8A51-4CE1-BE6C-994BDE3A8F97", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*", "matchCriteriaId": "09854948-2657-4261-A32A-0523058F072E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*", "matchCriteriaId": "D13904A5-266D-481C-A42A-734C3823A238", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*", "matchCriteriaId": "ACC82FCB-0541-45C4-8B7E-CB612D7F702A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*", "matchCriteriaId": "6C18BD84-5E9C-4C9E-B0AA-2CEB0D7A58C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*", "matchCriteriaId": "0F5ABC7E-C4E0-4850-A1E6-07EBCF4A87D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*", "matchCriteriaId": "501E9355-0CDD-4951-BCC3-47962788BCCB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*", "matchCriteriaId": "B3D976D9-62F0-43C3-8359-E51E26B6CD87", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*", "matchCriteriaId": "02AFBCD0-9B4B-4CA3-8FA9-D8B6ECB24894", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*", "matchCriteriaId": "64ADE9AF-196F-4E0B-BC66-7DE0183F9032", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*", "matchCriteriaId": "C90CCA48-1705-4564-AAF9-271201BD5113", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*", "matchCriteriaId": "0B82BAFF-17F5-465C-8032-67D5ECAB2921", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*", "matchCriteriaId": "1F694FEC-B97D-4BDA-ADFA-751E8BFB7CD2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*", "matchCriteriaId": "F831371E-7437-48D7-8281-1F406215041B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*", "matchCriteriaId": "BC4F06B5-615A-464A-A0C4-7AABEE8530CD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*", "matchCriteriaId": "92AF503A-A2B1-4FC3-858B-264049ADF0F8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*", "matchCriteriaId": "E702C7EC-B1D9-4BDF-B334-2004CD76B52B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*", "matchCriteriaId": "E39F31D6-DC4B-46FE-BE5D-EA612D915A96", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*", "matchCriteriaId": "51CB8036-5F36-4CD4-9B3E-D2401F2E64F6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*", "matchCriteriaId": "F9849BA3-3990-4E30-B99B-ADD043314CDA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*", "matchCriteriaId": "A20FB18A-D3DA-4DE9-BEFF-75B7AB9B9A55", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*", "matchCriteriaId": "7A67CD6F-5E4F-4E69-A2A9-A4033DCE08EA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*", "matchCriteriaId": "A0A22E92-1EA7-45D9-AC86-EC3D9664C294", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*", "matchCriteriaId": "D7FA2911-6561-47BF-BEE8-DDA31642C346", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*", "matchCriteriaId": "1FA6CA23-6F2B-44D5-B2DA-4F142BA3E48A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*", "matchCriteriaId": "0F829DED-4D92-401A-BD80-C070DE57FC7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*", "matchCriteriaId": "F560575C-FD8E-485D-B50A-572604BBE903", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*", "matchCriteriaId": "6ED8C51B-AE59-46DC-85F9-6D3B2891CB3F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*", "matchCriteriaId": "1A38D00A-B9DC-44DF-8247-70355FF9A6EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*", "matchCriteriaId": "381EFC43-D5D9-4D10-90BE-4C333A9BA074", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*", "matchCriteriaId": "CBEDED18-2755-4C55-A1A1-04B4D5F40276", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*", "matchCriteriaId": "F04B57EC-0731-40C8-939F-1C686A65A0FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*", "matchCriteriaId": "2AB301FB-EB3E-4F5F-868D-5B66CC7E1E6B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*", "matchCriteriaId": "CE1D28F9-B135-441B-A9BF-792DD356E374", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*", "matchCriteriaId": "4D01CE3E-5C89-4FC0-9097-CAC483ACD441", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*", "matchCriteriaId": "7BDD55C4-AFCD-4DF2-921C-DDC1D7556DA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*", "matchCriteriaId": "8F52334F-BE6A-4FD4-9F63-AE9BB017115B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*", "matchCriteriaId": "C7C9BCC3-B9A6-4195-BF2F-E7BBCE8DC269", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*", "matchCriteriaId": "2A4DFFA7-AA0E-4D7E-97B8-13389FD47D4A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*", "matchCriteriaId": "707F6671-57AC-4DF4-8024-444502E5C92E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*", "matchCriteriaId": "3C1FCE07-F9E8-4B14-95CE-01784D472128", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*", "matchCriteriaId": "C208711F-FC06-46C8-8849-27054DC1B264", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*", "matchCriteriaId": "25AB8041-F201-4BB3-AAD9-199B06697DF3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*", "matchCriteriaId": "D75C474C-D5EF-42D6-9B2A-A504BEFCB982", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*", "matchCriteriaId": "1F566CD3-3649-492B-B0AB-A107E51675B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*", "matchCriteriaId": "BB9F3D74-AE72-4FC5-83E9-890781AF3093", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*", "matchCriteriaId": "0E8EA6A7-4AB8-487E-B5DD-9989CC5F1CD8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*", "matchCriteriaId": "DF63DDC8-A0C1-482B-92F2-CF6135E8C2A5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*", "matchCriteriaId": "C69918C6-7AAD-4AA5-AB72-C275367B1008", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*", "matchCriteriaId": "06155B0B-A5AD-4A82-8C02-D264981687A6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*", "matchCriteriaId": "F76C19A4-FA26-432A-9443-9F92B2A946EB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE9BE-E49A-489B-B333-95D0993F8FA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*", "matchCriteriaId": "7427A678-EC47-4030-B905-619DD95F5A82", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*", "matchCriteriaId": "86749716-1C9F-4C2A-B2A7-E62DEC10EA30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*", "matchCriteriaId": "FD000B53-06DA-4ED4-B0EE-9CB201B75C8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*", "matchCriteriaId": "A8424463-C329-4BAA-8AA1-25CD8B63292E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*", "matchCriteriaId": "52727E62-0048-4C56-BC8C-B3450D257B21", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*", "matchCriteriaId": "9D8223AA-F077-45FD-A7E3-3C2C1A8F6E91", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*", "matchCriteriaId": "FAA34B50-2330-4D77-BF1A-6F05F3EF222C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*", "matchCriteriaId": "F6421F69-1076-43D2-B273-DE80FB2D5F72", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*", "matchCriteriaId": "C1EDA9E2-CFE7-4917-BE48-A83208BDF0F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*", "matchCriteriaId": "9A34E7FC-93A4-45F2-A7B6-4A8ABFCAB0F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*", "matchCriteriaId": "7E611EDD-D44C-4311-B681-431D7C574528", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*", "matchCriteriaId": "C5E1B6AA-2F9A-43A8-9147-2BD9474E54C7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*", "matchCriteriaId": "1886D007-85B6-4E5A-968D-A1FD476A08A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*", "matchCriteriaId": "BDDDCB65-4404-49BC-9515-ECECD58A667F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*", "matchCriteriaId": "1B8D3E00-64C3-407A-9B00-8B6E383F73FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*", "matchCriteriaId": "CB1B00A1-9C15-47C2-9F57-66586DEACC7D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*", "matchCriteriaId": "CB5BF932-459F-4DD2-B160-5FE0371C7D83", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*", "matchCriteriaId": "A58ACE96-F1BE-4261-8F94-FC3C6E7C7561", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*", "matchCriteriaId": "783D6EA7-C016-4314-A87B-4FED1DC7114B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*", "matchCriteriaId": "7AD0176F-FFAE-4A85-9327-CE72FE059E90", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*", "matchCriteriaId": "A56970C7-F8D3-41B2-A78B-0C7F4A2A4E0A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*", "matchCriteriaId": "26D4CE1F-86C8-4E48-9146-9DB57BF540FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*", "matchCriteriaId": "CB7F9D65-5537-4C25-B02B-2393F60D1299", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*", "matchCriteriaId": "F09C8A92-820D-4572-A797-180E17A7DEB6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*", "matchCriteriaId": "CA7D77A2-0D9A-4D0D-B0DC-152757917BE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*", "matchCriteriaId": "A07D3F1A-16CE-461F-A2F4-80FE5F841CB3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*", "matchCriteriaId": "0C04557A-C508-4FAD-A535-1C0AEFF08075", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*", "matchCriteriaId": "6AFAE489-6679-4705-BF9C-BB6D385A1DC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*", "matchCriteriaId": "429A99C8-BC55-4887-893C-7124C1A5DB08", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*", "matchCriteriaId": "E3A2B709-CC19-4116-A5BE-5DB5C8B45A12", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*", "matchCriteriaId": "D79DAC74-1F28-4EC8-B417-3FAFFB74C4BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*", "matchCriteriaId": "6F1F1377-6220-43FB-BEF9-BAA7B0158147", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*", "matchCriteriaId": "18422CA8-3000-46B1-9065-2369E6B0BE16", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*", "matchCriteriaId": "5D558C66-E80E-4FC7-A0DF-485466390C46", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*", "matchCriteriaId": "E23EA9AE-9E70-47B5-AD9B-0DF13A0939E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*", "matchCriteriaId": "860F22F6-4C87-47C5-965E-02A1AFF41A72", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*", "matchCriteriaId": "19A2CA86-BFA8-4C78-987D-AD26F32622F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*", "matchCriteriaId": "EEF64E0A-CDB0-427E-A96F-095EFEBA0A3D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*", "matchCriteriaId": "425F6D34-EE60-464B-8EA6-8116EDAA1219", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*", "matchCriteriaId": "CEB9F657-1239-4424-A2E8-F8BD98C0095E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*", "matchCriteriaId": "F631403C-0A67-42CB-815C-133EB87E0C95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*", "matchCriteriaId": "6A4A5A57-B1A2-4BBA-AC36-7EA7DF9CDE06", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*", "matchCriteriaId": "0453C0EA-BA67-49D5-964F-35493F97D905", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*", "matchCriteriaId": "4D4D237E-ACB7-4382-AF5B-D27E634BF867", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*", "matchCriteriaId": "B5461EB2-2958-4923-86AF-C74D449120B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*", "matchCriteriaId": "45C22141-E698-4E38-AF50-9CE04C1168FE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*", "matchCriteriaId": "49D0E470-427D-4A68-AFD2-982A4F7CE2D7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*", "matchCriteriaId": "43AB50F3-14AC-44BD-B7F0-A683C5FD1A3F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*", "matchCriteriaId": "713C4B7A-C38A-4818-A258-D07DEDEC906E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*", "matchCriteriaId": "C59740BE-FC30-4400-B978-1DB41282971C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*", "matchCriteriaId": "839728F0-5F23-462F-B493-C37EE4C874F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*", "matchCriteriaId": "6F1B47DA-BA53-4D7A-9B5B-582238D5E99A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*", "matchCriteriaId": "D452F1BF-1FA5-463C-8F13-6357509FB5D1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*", "matchCriteriaId": "EF6D1F4C-B396-468C-BA32-9367A68C95DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*", "matchCriteriaId": "B76A812F-D77A-49C8-B7A5-0C08258D4BBD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*", "matchCriteriaId": "6E001AAB-07EC-47BF-BDE9-BB927872781D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF11F5-61E8-4A98-86C8-49D6B3224FCC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*", "matchCriteriaId": "AED153E7-99A2-4C02-B81B-C3DDF8FAE1A0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*", "matchCriteriaId": "D024802A-EA60-4D9B-B04C-027A0703EABD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*", "matchCriteriaId": "BA731F3C-1F04-4EE2-83EC-9486F5032903", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*", "matchCriteriaId": "544A59F6-E731-43C8-8455-69256933E71D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*", "matchCriteriaId": "624258EE-7FFF-4432-9B6D-4D60AA73CD9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*", "matchCriteriaId": "69A2701A-35A8-4268-B9CF-40BA3219373B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*", "matchCriteriaId": "15E671F6-8DED-4735-BE97-58A60E5B5C13", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*", "matchCriteriaId": "3FC68B2A-8570-4311-BB60-49DBBDAF7430", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*", "matchCriteriaId": "9826FA02-937E-4323-B9D5-8AE059ADBE95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*", "matchCriteriaId": "9B8630BB-48AA-4688-A6F0-212C1BB4D14C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*", "matchCriteriaId": "9AC98D35-D7D5-4C24-B47E-EDE2A80B2B9E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*", "matchCriteriaId": "A2F8ABCB-12C3-4C45-844E-B07F77DA2DE9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*", "matchCriteriaId": "326105AC-3926-437E-8AFF-916960107050", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*", "matchCriteriaId": "866E1275-7541-4B80-8FDF-53246A204C15", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*", "matchCriteriaId": "E190929D-D3CC-46E1-A903-0848829061DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*", "matchCriteriaId": "81E4EBCB-B660-4F6A-AD73-81B9D8964162", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*", "matchCriteriaId": "55D58CC5-CB46-464D-93B8-6AD5A19AF097", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*", "matchCriteriaId": "16541D3E-EBBD-4D92-96D8-F169733377AE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*", "matchCriteriaId": "3F08D257-F570-4D39-A6E8-0F60E55472E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*", "matchCriteriaId": "C20ED667-2BFB-41C7-82BA-9F0C0044DA08", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*", "matchCriteriaId": "6158ED8A-007E-48B7-99BF-8BA03BF584BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*", "matchCriteriaId": "DBA7096A-F321-49A0-911A-F9683ABE6E6A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*", "matchCriteriaId": "6A471395-7F8F-4BA5-962D-4D8F271FAB47", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*", "matchCriteriaId": "B9484380-92B9-44DB-8E20-DC8DE02D1CA6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*", "matchCriteriaId": "8010808D-805D-4CA3-9EA2-55EB1E57964C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*", "matchCriteriaId": "9716FE9F-A056-42A3-A241-F2FE37A6386A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*", "matchCriteriaId": "F73422A3-ECA0-4C41-9AA5-CF7D77885CF6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*", "matchCriteriaId": "7A96A5AF-C9EF-4DED-AE25-4540A2B02915", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*", "matchCriteriaId": "D5115B12-053A-4866-A833-D6EC88D8F93E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*", "matchCriteriaId": "C5619D4D-9685-4595-8A5F-A18273FE4213", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*", "matchCriteriaId": "B77E00E7-0EA4-4E32-A693-0E0F66BA4C57", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*", "matchCriteriaId": "DAA3457E-7E1A-4878-9752-79382E954A66", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*", "matchCriteriaId": "68630C63-4457-4E12-B7BD-AD456B237FC5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*", "matchCriteriaId": "F6FB5695-2950-4CEC-81B4-FD280F835330", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*", "matchCriteriaId": "9F340AF8-508F-449D-9AFA-4E55F069B4F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*", "matchCriteriaId": "E944410E-D674-4141-B50C-9F55090325FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*", "matchCriteriaId": "A6438E07-0AC0-4BF9-B0F2-9072CA9639D6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*", "matchCriteriaId": "5079AA70-C864-4AE2-809C-52B50632F2B3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*", "matchCriteriaId": "5D124BCB-D8C3-49F5-B05C-E09B3CEBEBCD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*", "matchCriteriaId": "6A86291B-C986-4320-BCEF-9F5AD8B309D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*", "matchCriteriaId": "1227659F-1393-4189-978B-CC3DC53BF407", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*", "matchCriteriaId": "4C2DB843-638F-41EF-B486-409318AA2DE9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*", "matchCriteriaId": "A0004D8A-A186-4DA2-A7AB-18A6456438FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*", "matchCriteriaId": "75B6BE9F-F113-4976-951D-53F2E183A95A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*", "matchCriteriaId": "DEB005F1-9719-4985-B9D9-2140C962ADD1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*", "matchCriteriaId": "A94D0C1B-F30F-4724-915E-192C53FAE58A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*", "matchCriteriaId": "3F247860-1D2C-415C-AFBD-26BD875AAF02", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*", "matchCriteriaId": "9697EDCD-A742-4AC6-876E-1080AD684207", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*", "matchCriteriaId": "6E73924A-875B-44D0-8F7C-A822B0488126", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*", "matchCriteriaId": "03751B92-EE07-4F16-A476-BD25561810BC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon:*:*:*:*:*:*:*:*", "matchCriteriaId": "DAF71B61-A595-476B-B949-1A0FBDB360A6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis." }, { "lang": "es", "value": "Los sistemas con microprocesadores que emplean la ejecuci\u00f3n especulativa y traducciones de direcciones podr\u00eda permitir la divulgaci\u00f3n no autorizada de informaci\u00f3n que reside en la cach\u00e9 de datos L1 a un atacante con acceso de usuario local con privilegios de invitado del sistema operativo mediante un error de p\u00e1gina del terminal y un an\u00e1lisis de canal lateral." } ], "id": "CVE-2018-3646", "lastModified": "2024-11-21T04:05:50.020", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.1, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-08-14T19:29:00.920", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "http://support.lenovo.com/us/en/solutions/LEN-24163" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105080" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041451" }, { "source": "secure@intel.com", "url": "http://www.securitytracker.com/id/1042004" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2018-0020.html" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "http://xenbits.xen.org/xsa/advisory-273.html" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2387" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2388" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2389" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2391" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2392" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2393" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2394" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2396" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2402" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2403" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2404" }, { "source": "secure@intel.com", "url": "https://access.redhat.com/errata/RHSA-2018:2602" }, { "source": "secure@intel.com", "url": "https://access.redhat.com/errata/RHSA-2018:2603" }, { "source": "secure@intel.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf" }, { "source": "secure@intel.com", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "source": "secure@intel.com", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://foreshadowattack.eu/" }, { "source": "secure@intel.com", "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "source": "secure@intel.com", "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html" }, { "source": "secure@intel.com", "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "source": "secure@intel.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V4UWGORQWCENCIF2BHWUEF2ODBV75QS2/" }, { "source": "secure@intel.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XRFKQWYV2H4BV75CUNGCGE5TNVQCLBGZ/" }, { "source": "secure@intel.com", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0010" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.asc" }, { "source": "secure@intel.com", "url": "https://security.gentoo.org/glsa/201810-06" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180815-0001/" }, { "source": "secure@intel.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K31300402" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03874en_us" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3740-1/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3740-2/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3741-1/" }, { "source": "secure@intel.com", "url": "https://usn.ubuntu.com/3741-2/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3742-1/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3742-2/" }, { "source": "secure@intel.com", "url": "https://usn.ubuntu.com/3756-1/" }, { "source": "secure@intel.com", "url": "https://usn.ubuntu.com/3823-1/" }, { "source": "secure@intel.com", "url": "https://www.debian.org/security/2018/dsa-4274" }, { "source": "secure@intel.com", "url": "https://www.debian.org/security/2018/dsa-4279" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html" }, { "source": "secure@intel.com", "url": "https://www.kb.cert.org/vuls/id/982149" }, { "source": "secure@intel.com", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "secure@intel.com", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "source": "secure@intel.com", "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/support/security/Synology_SA_18_45" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://support.lenovo.com/us/en/solutions/LEN-24163" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105080" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041451" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1042004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2018-0020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://xenbits.xen.org/xsa/advisory-273.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2387" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2388" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2389" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2391" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2392" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2393" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2394" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2396" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2402" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2403" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2404" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:2602" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:2603" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://foreshadowattack.eu/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V4UWGORQWCENCIF2BHWUEF2ODBV75QS2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XRFKQWYV2H4BV75CUNGCGE5TNVQCLBGZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0010" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.asc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201810-06" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180815-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K31300402" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03874en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3740-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3740-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3741-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/3741-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3742-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3742-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/3756-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/3823-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4274" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4279" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.kb.cert.org/vuls/id/982149" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/support/security/Synology_SA_18_45" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…